{"id":2972,"date":"2025-11-11T10:13:37","date_gmt":"2025-11-11T10:13:37","guid":{"rendered":"https:\/\/ventum-infosec.com\/?p=2972"},"modified":"2025-11-11T13:17:44","modified_gmt":"2025-11-11T13:17:44","slug":"%f0%9f%9a%a8-%f0%9d%97%9c%f0%9d%97%94%f0%9d%97%a0-%f0%9d%97%a7%f0%9d%97%aa%f0%9d%97%a2-%f0%9d%97%a6%f0%9d%97%a7%f0%9d%97%98%f0%9d%97%a3%f0%9d%97%a6-%f0%9d%97%99%f0%9d%97%a5%f0%9d%97%a2%f0%9d%97%a0","status":"publish","type":"post","link":"https:\/\/ventum-infosec.com\/en\/%f0%9f%9a%a8-%f0%9d%97%9c%f0%9d%97%94%f0%9d%97%a0-%f0%9d%97%a7%f0%9d%97%aa%f0%9d%97%a2-%f0%9d%97%a6%f0%9d%97%a7%f0%9d%97%98%f0%9d%97%a3%f0%9d%97%a6-%f0%9d%97%99%f0%9d%97%a5%f0%9d%97%a2%f0%9d%97%a0\/","title":{"rendered":"\ud83d\udea8 \ud835\udddc\ud835\uddd4\ud835\udde0 \ud835\udde7\ud835\uddea\ud835\udde2 \ud835\udde6\ud835\udde7\ud835\uddd8\ud835\udde3\ud835\udde6 \ud835\uddd9\ud835\udde5\ud835\udde2\ud835\udde0 \ud835\udddb\ud835\uddd8\ud835\udddf\ud835\udddf \u2014 \ud835\uddd8\ud835\udde3\ud835\udddc\ud835\udde6\ud835\udde2\ud835\uddd7\ud835\uddd8 \ud835\udfef                                            \ud835\udc07\ud835\udc11 \ud835\udc22\ud835\udc2c \ud835\udc2d\ud835\udc21\ud835\udc1e \ud835\udc2c\ud835\udc28\ud835\udc2e\ud835\udc2b\ud835\udc1c\ud835\udc1e \ud835\udc28\ud835\udc1f \ud835\udc2d\ud835\udc2b\ud835\udc2e\ud835\udc2d\ud835\udc21 \u2014 \ud835\udc2e\ud835\udc27\ud835\udc2d\ud835\udc22\ud835\udc25 \ud835\udc22\ud835\udc2d \ud835\udc22\ud835\udc2c\ud835\udc27&#8217;\ud835\udc2d."},"content":{"rendered":"<p>We planned to talk about GPT in IAM \u2014 but this HR data mess couldn\u2019t wait.<\/p>\n\n\n\n<p>In this episode:<br>\ud83d\udd39 Why HR data isn\u2019t so trustworthy<br>\ud83d\udd39 How it breaks IGA<br>\ud83d\udd39 What you can do about it<br><br>\ud83d\udc49 Swipe through \u2014 audit season is coming.<br>\ud83c\udf99\ufe0f \u201cFrom Prompt to Panic: Let GPT Drive IAM\u201d is up next.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7358074763224739840\">LinkedIn Post<\/a><\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2975\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/1-1-819x1024.png\" alt=\"\" class=\"wp-image-2975\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2974\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/2-819x1024.png\" alt=\"\" class=\"wp-image-2974\"\/><\/figure>\n<\/figure>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2984\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/3-2-819x1024.png\" alt=\"\" class=\"wp-image-2984\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2988\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/4-5-819x1024.png\" alt=\"\" class=\"wp-image-2988\" srcset=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/4-5-819x1024.png 819w, https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/4-5-240x300.png 240w, https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/4-5-768x960.png 768w, https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/4-5-10x12.png 10w, https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/4-5.png 1200w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/><\/figure>\n<\/figure>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2978\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/5-3-819x1024.png\" alt=\"\" class=\"wp-image-2978\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2979\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/6-2-819x1024.png\" alt=\"\" class=\"wp-image-2979\"\/><\/figure>\n<\/figure>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-4 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2981\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/7-2-819x1024.png\" alt=\"\" class=\"wp-image-2981\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" data-id=\"2980\" src=\"https:\/\/ventum-infosec.com\/wp-content\/uploads\/2025\/11\/8-2-819x1024.png\" alt=\"\" class=\"wp-image-2980\"\/><\/figure>\n<\/figure>","protected":false},"excerpt":{"rendered":"<p>We planned to talk about GPT in IAM \u2014 but this HR data mess couldn\u2019t wait. In this episode:\ud83d\udd39 Why HR data isn\u2019t so trustworthy\ud83d\udd39 How it breaks IGA\ud83d\udd39 What you can do about it \ud83d\udc49 Swipe through \u2014 audit season is coming.\ud83c\udf99\ufe0f \u201cFrom Prompt to Panic: Let GPT Drive IAM\u201d is up next. LinkedIn [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":3077,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[94],"tags":[24,93],"class_list":["post-2972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iam-two-steps-from-hell","tag-digital-identity","tag-iam-two-steps-from-hell"],"acf":[],"_links":{"self":[{"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/posts\/2972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/comments?post=2972"}],"version-history":[{"count":2,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/posts\/2972\/revisions"}],"predecessor-version":[{"id":3060,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/posts\/2972\/revisions\/3060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/media\/3077"}],"wp:attachment":[{"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/media?parent=2972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/categories?post=2972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ventum-infosec.com\/en\/wp-json\/wp\/v2\/tags?post=2972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}