As cyberattacks increase in volume and sophistication it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and identities via lateral movement and poor identity security hygiene. Detecting and defending against this MUST be the basis of a modern cybersecurity initiative.
Join author and BeyondTrust Chief Security Advisor Morey J.Haber as he shares the risks associated with poor identity security disciplines, techniques that external threat actors and insiders leverage, and operational best practices to protect against identity theft, and to develop an effective identity security strategy.
You will hear:
- Examples of tactics used in real world identity attacks
- The Top Five Identity Risks in 2024
- Operational best practices to protect Identities & Access from Cyberthreats