Sophisticated and opportunistic adversaries rely heavily on identity compromise multiple times across the attack lifecycle. Protecting credentials and the identity infrastructure that hosts them (AD/EntraID) has become a critical component of a comprehensive security strategy. IAM, PAM, and EDR are no longer sufficient but must be combined with effective Identity Threat Detection & Response to prevent attackers from discovering and exploiting key weaknesses across every enterprise.

Takeaways from the talk:

  • Understand the role Identity Attack Surface Reduction and ITDR play in building a defensive strategy against attackers
  • Dispel several common myths about ITDR and its importance in a comprehensive protection strategy
  • Learn about the ‘Anatomy of an Identity Attack’ to better understand the weaknesses in traditional security architectures

September 5 @ 13:30
13:30 — 14:15 (45′)

Michael Leland