So, Identity is the New Perimeter. Why is it so Hard to Defend?
In this webinar, you will learn:
- How and why identity infrastructure has become a key attack surface
- Methods that attackers are using to target identity
- Key controls that can be put in place to strengthen the identity perimeter
The rise of public cloud infrastructure and remote work have weakened network-based models of security. The network-first models have been replaced by the tenets of zero trust and least privilege. A core component of zero trust is placing user identity and associated entitlements at the center of security. It is now common to hear the refrain: ”Identity is the new perimeter.”
But, if identity is the new perimeter, why are we struggling to defend it? In the last 18 months, hackers have leveraged identity-based attacks to accomplish high profile and costly attacks on major brands. To help organizations bolster their identity perimeter, this webinar will cover core concepts of modern identity infrastructure and how attackers are targeting those components.
Presenter Info
Ted Kietzman, Product Marketing Manager
Ted researches trends in the cybersecurity industry with a focus on identity and access management. He has particular interest in the adoption of passwordless authentication and identity threat detection and response. He has experience working for both large cyber companies and small startups. He has an MBA from Emory University and a Bachelor's Degree in Physics from Bowdoin College.