{"id":1222,"date":"2025-04-22T09:59:51","date_gmt":"2025-04-22T09:59:51","guid":{"rendered":"https:\/\/privilegedremoteaccess.net\/?p=1222"},"modified":"2025-04-22T10:03:41","modified_gmt":"2025-04-22T10:03:41","slug":"exploring-orphaned-accounts-with-bert-blevins","status":"publish","type":"post","link":"https:\/\/privilegedremoteaccess.net\/?p=1222","title":{"rendered":"Exploring Orphaned Accounts with Bert Blevins"},"content":{"rendered":"<div style=\"width: 800px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-1222-1\" width=\"800\" height=\"1422\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/incgpt.com\/wp-content\/uploads\/2025\/04\/Exploring-Orphaned-Accounts-with-Bert-Blevins-1080.mp4?_=1\" \/><a href=\"https:\/\/incgpt.com\/wp-content\/uploads\/2025\/04\/Exploring-Orphaned-Accounts-with-Bert-Blevins-1080.mp4\">https:\/\/incgpt.com\/wp-content\/uploads\/2025\/04\/Exploring-Orphaned-Accounts-with-Bert-Blevins-1080.mp4<\/a><\/video><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this video, Bert Blevins breaks down the hidden risks and security gaps caused by orphaned accounts\u2014user accounts that remain active even after an employee leaves or a role changes. Discover how these forgotten access points can become a critical vulnerability in your identity security strategy, and learn practical steps for identifying, managing, and eliminating them.<\/p>\n<p>Whether you&#8217;re in IT, security, or audit, this video will help you understand why orphaned accounts are more than just a housekeeping issue\u2014they&#8217;re a real threat to your organization\u2019s privileged access controls.<\/p>\n<p>\ud83d\udd10 Key Takeaways:<\/p>\n<p>What orphaned accounts are and why they matter<\/p>\n<p>How they pose risks in identity and privileged access management<\/p>\n<p>Steps to identify and remediate orphaned accounts<\/p>\n<p>Best practices for lifecycle management and compliance<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[79],"class_list":["post-1222","post","type-post","status-publish","format-standard","hentry","category-blog","tag-orphanedaccounts-identitysecurity-pam-cybersecurity-bertblevins-accesscontrol-privilegedaccessmanagement"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Exploring Orphaned Accounts with Bert Blevins - privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/privilegedremoteaccess.net\/?p=1222\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploring Orphaned Accounts with Bert Blevins\" \/>\n<meta property=\"og:description\" content=\"In this video, Bert Blevins breaks down the hidden risks and security gaps caused by orphaned accounts\u2014user accounts that remain active even after an employee leaves or a role changes. Discover how these forgotten access points can become a critical vulnerability in your identity security strategy, and learn practical steps for identifying, managing, and eliminating them.  Whether you&#039;re in IT, security, or audit, this video will help you understand why orphaned accounts are more than just a housekeeping issue\u2014they&#039;re a real threat to your organization\u2019s privileged access controls.  \ud83d\udd10 Key Takeaways:  What orphaned accounts are and why they matter  How they pose risks in identity and privileged access management  Steps to identify and remediate orphaned accounts  Best practices for lifecycle management and compliance\" \/>\n<meta property=\"og:url\" content=\"https:\/\/privilegedremoteaccess.net\/?p=1222\" \/>\n<meta property=\"og:site_name\" content=\"privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-22T09:59:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-22T10:03:41+00:00\" \/>\n<meta name=\"author\" content=\"Newlife\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newlife\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/?p=1222#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/?p=1222\"},\"author\":{\"name\":\"Newlife\",\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/#\\\/schema\\\/person\\\/28517fe6aded8ea6e4efcfe72c785e0e\"},\"headline\":\"Exploring Orphaned Accounts with Bert Blevins\",\"datePublished\":\"2025-04-22T09:59:51+00:00\",\"dateModified\":\"2025-04-22T10:03:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/?p=1222\"},\"wordCount\":18,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/#organization\"},\"keywords\":[\"#OrphanedAccounts #IdentitySecurity #PAM #CyberSecurity #BertBlevins #AccessControl #PrivilegedAccessManagement\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/privilegedremoteaccess.net\\\/?p=1222#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/?p=1222\",\"url\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/?p=1222\",\"name\":\"Exploring Orphaned Accounts with Bert Blevins - privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/#website\"},\"datePublished\":\"2025-04-22T09:59:51+00:00\",\"dateModified\":\"2025-04-22T10:03:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/?p=1222#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/privilegedremoteaccess.net\\\/?p=1222\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/?p=1222#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploring Orphaned Accounts with Bert Blevins\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/#website\",\"url\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/\",\"name\":\"privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/#organization\",\"name\":\"privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access\",\"url\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/cropped-logo_01_white-1.png\",\"contentUrl\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/cropped-logo_01_white-1.png\",\"width\":426,\"height\":56,\"caption\":\"privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access\"},\"image\":{\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/#\\\/schema\\\/person\\\/28517fe6aded8ea6e4efcfe72c785e0e\",\"name\":\"Newlife\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9e1c1afe40e2298e1a67c19de23e251406126d1dd95837d0db71d3233e1a3563?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9e1c1afe40e2298e1a67c19de23e251406126d1dd95837d0db71d3233e1a3563?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9e1c1afe40e2298e1a67c19de23e251406126d1dd95837d0db71d3233e1a3563?s=96&d=mm&r=g\",\"caption\":\"Newlife\"},\"sameAs\":[\"https:\\\/\\\/privilegedremoteaccess.net\"],\"url\":\"https:\\\/\\\/privilegedremoteaccess.net\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Exploring Orphaned Accounts with Bert Blevins - privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/privilegedremoteaccess.net\/?p=1222","og_locale":"en_US","og_type":"article","og_title":"Exploring Orphaned Accounts with Bert Blevins","og_description":"In this video, Bert Blevins breaks down the hidden risks and security gaps caused by orphaned accounts\u2014user accounts that remain active even after an employee leaves or a role changes. Discover how these forgotten access points can become a critical vulnerability in your identity security strategy, and learn practical steps for identifying, managing, and eliminating them.  Whether you're in IT, security, or audit, this video will help you understand why orphaned accounts are more than just a housekeeping issue\u2014they're a real threat to your organization\u2019s privileged access controls.  \ud83d\udd10 Key Takeaways:  What orphaned accounts are and why they matter  How they pose risks in identity and privileged access management  Steps to identify and remediate orphaned accounts  Best practices for lifecycle management and compliance","og_url":"https:\/\/privilegedremoteaccess.net\/?p=1222","og_site_name":"privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access","article_published_time":"2025-04-22T09:59:51+00:00","article_modified_time":"2025-04-22T10:03:41+00:00","author":"Newlife","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newlife"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/privilegedremoteaccess.net\/?p=1222#article","isPartOf":{"@id":"https:\/\/privilegedremoteaccess.net\/?p=1222"},"author":{"name":"Newlife","@id":"https:\/\/privilegedremoteaccess.net\/#\/schema\/person\/28517fe6aded8ea6e4efcfe72c785e0e"},"headline":"Exploring Orphaned Accounts with Bert Blevins","datePublished":"2025-04-22T09:59:51+00:00","dateModified":"2025-04-22T10:03:41+00:00","mainEntityOfPage":{"@id":"https:\/\/privilegedremoteaccess.net\/?p=1222"},"wordCount":18,"commentCount":0,"publisher":{"@id":"https:\/\/privilegedremoteaccess.net\/#organization"},"keywords":["#OrphanedAccounts #IdentitySecurity #PAM #CyberSecurity #BertBlevins #AccessControl #PrivilegedAccessManagement"],"articleSection":["Blog"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/privilegedremoteaccess.net\/?p=1222#respond"]}]},{"@type":"WebPage","@id":"https:\/\/privilegedremoteaccess.net\/?p=1222","url":"https:\/\/privilegedremoteaccess.net\/?p=1222","name":"Exploring Orphaned Accounts with Bert Blevins - privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access","isPartOf":{"@id":"https:\/\/privilegedremoteaccess.net\/#website"},"datePublished":"2025-04-22T09:59:51+00:00","dateModified":"2025-04-22T10:03:41+00:00","breadcrumb":{"@id":"https:\/\/privilegedremoteaccess.net\/?p=1222#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/privilegedremoteaccess.net\/?p=1222"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/privilegedremoteaccess.net\/?p=1222#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/privilegedremoteaccess.net\/"},{"@type":"ListItem","position":2,"name":"Exploring Orphaned Accounts with Bert Blevins"}]},{"@type":"WebSite","@id":"https:\/\/privilegedremoteaccess.net\/#website","url":"https:\/\/privilegedremoteaccess.net\/","name":"privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access","description":"","publisher":{"@id":"https:\/\/privilegedremoteaccess.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/privilegedremoteaccess.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/privilegedremoteaccess.net\/#organization","name":"privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access","url":"https:\/\/privilegedremoteaccess.net\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/privilegedremoteaccess.net\/#\/schema\/logo\/image\/","url":"https:\/\/privilegedremoteaccess.net\/wp-content\/uploads\/2024\/06\/cropped-logo_01_white-1.png","contentUrl":"https:\/\/privilegedremoteaccess.net\/wp-content\/uploads\/2024\/06\/cropped-logo_01_white-1.png","width":426,"height":56,"caption":"privilegedremoteaccess | Delinea | Bert Blevins | Privileged Remote Access"},"image":{"@id":"https:\/\/privilegedremoteaccess.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/privilegedremoteaccess.net\/#\/schema\/person\/28517fe6aded8ea6e4efcfe72c785e0e","name":"Newlife","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/9e1c1afe40e2298e1a67c19de23e251406126d1dd95837d0db71d3233e1a3563?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9e1c1afe40e2298e1a67c19de23e251406126d1dd95837d0db71d3233e1a3563?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e1c1afe40e2298e1a67c19de23e251406126d1dd95837d0db71d3233e1a3563?s=96&d=mm&r=g","caption":"Newlife"},"sameAs":["https:\/\/privilegedremoteaccess.net"],"url":"https:\/\/privilegedremoteaccess.net\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/privilegedremoteaccess.net\/index.php?rest_route=\/wp\/v2\/posts\/1222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privilegedremoteaccess.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privilegedremoteaccess.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privilegedremoteaccess.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privilegedremoteaccess.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1222"}],"version-history":[{"count":0,"href":"https:\/\/privilegedremoteaccess.net\/index.php?rest_route=\/wp\/v2\/posts\/1222\/revisions"}],"wp:attachment":[{"href":"https:\/\/privilegedremoteaccess.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privilegedremoteaccess.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privilegedremoteaccess.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}