<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/author/ekuhrman/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:22:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to have effective Enterprise Identity &#038; Access Management (EIAM)</title>
		<link>https://warroom.rsmus.com/how-to-have-effective-enterprise-identity-access-management-eiam/</link>
		
		<dc:creator><![CDATA[Erik Kuhrman]]></dc:creator>
		<pubDate>Mon, 18 Jan 2021 19:22:33 +0000</pubDate>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[enterprise identity and access management]]></category>
		<category><![CDATA[IAG]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity and access management]]></category>
		<category><![CDATA[identity governance]]></category>
		<category><![CDATA[pam]]></category>
		<category><![CDATA[privileged access management]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5368</guid>

					<description><![CDATA[Your business operations can be complex and require multiple technologies such as applications, platforms, services and infrastructure. Effectively overseeing and controlling who has access to what across this landscape can be a daunting challenge. Unfortunately, there are numerous horror stories of failed IAM projects and many companies continue to struggle with effective IAM to protect [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
