Sophisticated and opportunistic adversaries rely heavily on identity compromise multiple times across the attack lifecycle. Protecting credentials and the identity infrastructure that hosts them (AD/EntraID) has become a critical component of a comprehensive security strategy. IAM, PAM, and EDR are no longer sufficient but must be combined with effective Identity Threat Detection & Response to prevent attackers from discovering and exploiting key weaknesses across every enterprise.
Takeaways from the talk:
- Understand the role Identity Attack Surface Reduction and ITDR play in building a defensive strategy against attackers
- Dispel several common myths about ITDR and its importance in a comprehensive protection strategy
- Learn about the ‘Anatomy of an Identity Attack’ to better understand the weaknesses in traditional security architectures
September 5 @ 13:30
13:30 — 14:15 (45′)
Michael Leland