HID - Workforce Identity and Access Management cover art

HID - Workforce Identity and Access Management

HID - Workforce Identity and Access Management

Written by: HID
Listen for free

About this listen

For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.

© 2025 HID - Workforce Identity and Access Management
Art
Episodes
  • The ROI of PIAM: Reducing Risk, Cost, & Complexity in Identity Management
    Nov 18 2025

    In this episode, we tackle one of the most pressing questions organizations face today: how do you measure the ROI of physical identity and access management (PIAM)?

    Join host Matthew Lewis alongside experts Phil Buck and Don Campbell as they break down the tangible and intangible benefits of PIAM across industries—from healthcare to oil and gas to financial services.

    The conversation explores real-world scenarios where onboarding efficiency, credential reissuance, and compliance automation translate into measurable savings and risk reduction. From high-frequency challenges like hospital staffing to high-stakes events such as major capital projects and M&A integrations, our guests share practical strategies for quantifying value beyond the spreadsheet.

    Whether you’re a security leader, operations manager, or simply curious about the business case for PIAM, this episode offers insights that will reshape how you think about identity, compliance, and the bottom line.

    Show More Show Less
    26 mins
  • Always-On PIAM: Enabling Real-Time Identity Governance Across the Enterprise
    Nov 18 2025

    Guests Don Campbell, Sr. Director, Product Management and Brent Vernon, Sr. Director, Technology & Product Management, are hosted by Matthew Lewis, Director of Product Marketing - all of HID Global

    In this episode, we explore the evolving priorities of CISOs in a world where the boundaries between physical and logical security are changing. Host Matthew Lewis is joined by HID’s product leaders Don Campbell and Brent Vernon for a candid conversation on the vulnerabilities that persist in modern enterprise environments—and the strategies that forward-thinking security leaders are using to address them.

    From the risks of credential harvesting and the push toward passwordless authentication, to the overlooked threat posed by contractors and third-party vendors, this discussion reveals why a holistic, always-on approach to identity and access management is no longer optional. Tune in to hear how convergence, collaboration, and smarter tooling are reshaping the security landscape—and what it means for your organization.

    Chapters:
    0:00 -- Introductions
    1:50 -- Data Considerations for CISOs
    11:00 -- Data Security and Risk That Come with Contractor Workforces
    14:25 -- Actionable Takeaways


    Show More Show Less
    18 mins
  • A PIAM Playbook for CISOs: Building a Unified Identity Strategy
    Nov 18 2025

    Guests Phil Buck, VP, Workforce Identity Management Business Unit and Darwin Rivera, Manager, Sales Engineering, are hosted by Matthew Lewis, Director of Product Marketing - all of HID Global

    In this episode, we dive deep into the evolving role of CISOs in shaping holistic security strategies that bridge the gap between physical and cyber domains. Join host Matthew Lewis and leaders Phil Buck and Dr. Darwin Rivera as they unpack the growing influence of identity and access management (IAM), the critical importance of data governance, and the rising challenges posed by third-party risk and agentic AI.

    From regulatory shifts to real-world breaches, this conversation explores the pressing concerns facing security leaders today—and why the convergence of technologies and responsibilities demands a fresh playbook. Whether you're a seasoned CISO or simply security-curious, this episode offers insights that will reshape how you think about risk, compliance, and the future of enterprise protection.

    Chapters:
    0:00 -- Introductions
    3:21 -- The Role of Data in the Top 5 Concerns CISOs Face Today
    5:40 -- Data and Risk of Suppliers
    8:05 -- AI & PIAM Considerations *with Security Breach Example
    13:18 -- Key Takeaways

    Show More Show Less
    16 mins
No reviews yet