Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of BeyondTrust
Forums it-sa Expo Knowledge Forum E

Does you organization suffer from an Identity Crisis?

This session explains risks of poor identity security, techniques used by threat actors and best practices to protect against identity theft.

calendar_today Wed, 23.10.2024, 13:30 - 13:45

event_available On site

place Forum, Booth 9-103

Action description

south_east

Speaker

south_east

Themes

Cloud Security Endpoint Protection Identity and access management Secure Homeoffice Websecurity / VPN Trend topic

Key Facts

  • Examples of tactics used in real world identity attacks#The Top Five Identity Risks in 2024#Best practices to protect identities & access from threats

Organizer

Event

This action is part of the event Forums it-sa Expo

Action description

As cyberattacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through lateral movement and poor identity security hygiene. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.

Join Chief Security Advisor Morey J. Haber as he shares the risks associated with poor identity security disciplines, techniques that external threat actors and insiders leverage, and operational best practices to protect against identity theft and account compromises and to develop an effective identity security strategy.
... read more

Language: English

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.