PAM: The Critical Foundation For a Successful Identity Security Strategy
Identity is the new perimeter, and as the threat actors evolve and the vendor hype machines kick into gear it can be very hard to navigate this threat landscape. With industry heavy weights like Microsoft and Okta becoming victims of identity based attacks it can also feel like the attacker have the upper hand.
In this engaging session we will dive into the world of identity security and look at how attacker target identities and identity infrastructure to access privileges and achieve their objectives. Using practical examples from BeyondTrust’s research team we will analyse some high profile attack chains and discuss how those threats could be prevented, detected and remediated.
We will also look at the some of the hype and acronyms around identity security and distil these down into practical areas that can provide focus in driving better security outcomes.
Join this session to delve deeper into the above and following:
- Understand how Identity Access Management (IAM) and Privilege Access Management (PAM) need to evolve in light of identity threats;
- See practical examples of tactics used in real world attacks and some of the mitigations available;
- Understanding of the identity blind spots that leave organizations vulnerable to attackers.