Automated Cyber Defense: Leveraging Identity Management to Get to Acceptable Losses
Cloud, Mobile & IAM Theatre
Wed 17th Oct 10:10 to 10:40
Today's world of cyber warfare is one of continuous zero-day attacks, targeted phishing scams and malicious insiders. Anyone trying to deal with these threats manually has already lost the game. You can't stop cyberattacks from occurring. But, you can limit the damage when these inevitable attacks strike. When you're under attack, blocking intrusions with automated identity management makes a huge difference in keeping your organization's name out of the data breach headlines. Based on my years of experience I'll cover how to redesign and automate your identity management (especially privileged identities) to achieve acceptable losses, even while under constant cyberattack.
What you will take away from this session
- A cyberattack is a matter of if, not when. But you can drastically limit the damage done.
- Time limit privileged passwords so that intruders who exploit stolen credentials are stopped in their tracks.
- Privileged access is pervasive and expanding. Get it under control to prevent devastating land and expand attacks
- With the right solution you can balance security with productivity, using a 6 step methodology.