
Identity Risk Assessment: Identify Attack Paths Before It's Too Late
BeyondTrust explains how to identify, prioritize, and mitigate hidden access risks—before attackers can exploit them.
Tickets
Get your expo ticket now!Topic
When & Where
Details
Format:
Technology lecture
Language:
German
Session description
Identities are the New Perimeter – and a Prime Target
With the shift from traditional data center and network perimeters to a distributed workforce in hybrid multi-cloud environments, the focus is no longer on firewalls but on user, service, and machine identities—including their entitlements and privileged access.
In reality, over-provisioned roles, orphaned accounts, misconfigurations, and unnoticed cross-domain connections between on-premises and cloud environments often create hidden attack paths to Tier-0 resources. This allows even a seemingly standard user to escalate privileges step by step through privilege creep and lateral movement—potentially gaining full control over critical systems.
In this 15-minute session, BeyondTrust will demonstrate, using real-worl ...