Rephonic
Artwork for Secured by Design

Secured by Design - IAM & Cybersecurity Podcast

Santosh Subramanian
Passkeys
Identity Threat Detection and Response
Identity
Identity First Security
Passwords
Customer Identity and Access Management
Software Composition Analysis
Static Application Security Testing
Dynamic Application Security Testing
SIAM
Orphaned Accounts
Identity and Access Management
Multi-Factor Authentication
Non-Human Identities
Stryker Corporation
Lite LLM
Open Source Software
Cloudflare
Provisioning
Digital Experience

Great security solution are designed from the ground up..Secured by Design is a podcast where Santosh shares practical insights, frameworks, and perspectives on identity security and other aspects of cybersecurity.Each episode breaks down complex concepts into actionable ideas for professionals protecting digital identities, designing secure systems, and leading security initiatives. Because true ... more

PublishesWeeklyEpisodes13Founded6 months ago
Number of ListenersCategory
Technology

Listen to this Podcast

Artwork for Secured by Design

Latest Episodes

Summary

This episode dissects the recent Vercel breach, a supply chain attack involving third-party AI tools, OAuth vulnerabilities, and insider risks. It highlights practical steps organizations can take to enhance cybersecurity and prevent similar... more

Summary

This episode explores the groundbreaking capabilities of Anthropic's Mythos AI model, its implications for cybersecurity, and how defenders can adapt to this new threat landscape. We discuss the model's ability to autonomously identify and e... more

Summary

This episode explores the critical relationship between identity and access management (IDAM) and holistic Governance, Risk, and Compliance (GRC) programs. Hosted by Santosh, it delves into how integrated identity management enhances securit... more

Summary

This episode explores the core tools in application security - SCA, SAST, and DAST and how they form a comprehensive, shift-left security strategy to protect modern applications from vulnerabilities throughout the development lifecycle.

Key... more

Summary

This episode explores the recent security breach involving Lite LLM, a popular open-source Python library, and discusses the implications for cybersecurity in AI development. Learn how a trusted tool was exploited, the attack's mechanics, an... more

Summary

This episode explores the critical importance of Identity Threat Detection and Response (ITDR) in modern cybersecurity. Hosted by Santosh, it covers how identity infrastructure is the most targeted layer in enterprises, the rise of identity-... more

Summary

This episode explores the March 2026 cyber attack on Stryker Corporation, a leading medical technology company, highlighting the attack's mechanics, motives, and lessons for organizations worldwide. Learn how nation-state actors target criti... more

Summary

In this episode of 'Secured by Design', we discuss the root cause for significant Cloudflare outage that occurred on November 18, 2025, which disrupted major internet services and highlighted the fragility of digital infrastructure. The conv... more

Key Facts

Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Host

Santosh
Host of Secured by Design, focused on identity security and practical cybersecurity frameworks.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#213
Saudi Arabia/Technology

Top Technology Podcasts

Smart Talks with IBM
Smart Talks with IBMPushkin Industries and iHeartPodcasts
Acquired
AcquiredBen Gilbert and David Rosenthal
Dwarkesh Podcast
Dwarkesh PodcastDwarkesh Patel
The Room Podcast
The Room PodcastClaudia Laurie and Madison McIlwain
Tomorrow, Today
Tomorrow, TodayShekhar Natarajan

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per EpisodeGender SkewLocation
InterestsProfessionsAge Range
Household IncomeSocial Media Reach

Frequently Asked Questions About Secured by Design

What is Secured by Design about and what kind of topics does it cover?

A security-focused show that breaks down practical identity and access management concepts into actionable guidance for professionals protecting digital identities, securing systems, and leading security initiatives. Across episodes, the host covers topics like zero trust, privileged access management, modern IAM and governance, authentication trends (passwordless and passkeys), non-human identities, and the interplay between security design and business outcomes. The format emphasizes real-world frameworks, risk reduction, and concrete steps for resilience, with case studies and notes on governance, onboarding, and lifecycle management. A standout trait is the emphasis on identity-centric security as a core design principle, rather than an... more

Where can I find podcast stats for Secured by Design?

Rephonic provides a wide range of podcast stats for Secured by Design. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Secured by Design and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Secured by Design get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Secured by Design, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Secured by Design?

Rephonic provides comprehensive predictive audience data for Secured by Design, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Secured by Design have?

To see how many followers or subscribers Secured by Design has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

How many episodes of Secured by Design are there?

Secured by Design launched 6 months ago and published 13 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Secured by Design?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Secured by Design?

Rephonic pulls ratings and reviews for Secured by Design from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Secured by Design?

Rephonic provides full transcripts for episodes of Secured by Design. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days