Attendee Info & Inquiries
Even if you are transitioning rapidly to strong authentication such as phishing resistant MFA or passkeys, there is a good chance that login sessions are hijacked post authentication, or there may be insiders who abuse their access for personal gain or other malicious intent. The real question is: What can you do to ensure that such incidents do not result in catastrophe? Dynamic, fine-grained authorization that enables zero-standing access is a promising approach, but making it work at enterprise scale requires multiple innovative technologies. Hear from Atul Tulshibagwale (SGNL) and Mark Neiswinger (The Walt Disney Company) on how you can implement zero standing privileges rapidly, without disrupting existing identity investments.