Identity systems are under attack like never before with attackers who simply login and elevate privilege. Learn where MFA and PAM work well, and how you can improve your attack detection capabilities to get a complete identity security solution. Additionally, understand how you can improve your overall identity security posture by ensuring identities are secured, your attack detections are comprehensive, and your response is tried and true. This session teaches: |
Slides from the presentation will be visible on this site if the speaker in question wishes to share them.
Please note that you need to be signed in in order to see them.