
Does you organization suffer from an Identity Crisis?
This session explains risks of poor identity security, techniques used by threat actors and best practices to protect against identity theft.
Topic
Cloud SecurityEndpoint ProtectionIdentity and access managementSecure HomeofficeWebsecurity / VPNTrend topic
When & Where
Details
Format:
Technology lecture
Session description
As cyberattacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through lateral movement and poor identity security hygiene. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.
Join Chief Security Advisor Morey J. Haber as he shares the risks associated with poor identity security disciplines, techniques that external threat actors and insiders leverage, and operational best practices to protect against identity theft and account compromises and to develop an effective identity security strategy.
Join Chief Security Advisor Morey J. Haber as he shares the risks associated with poor identity security disciplines, techniques that external threat actors and insiders leverage, and operational best practices to protect against identity theft and account compromises and to develop an effective identity security strategy.
Moderator
