Identity and Access Management (IAM) has long been one of the controls for securing organizations. However, as cloud adoption accelerates, disruptive technologies are introduced at an unprecedented pace, and regulatory pressure continues to rise, identity is becoming the primary security perimeter.
This session explores practical use cases where identity converges with broader cybersecurity strategies to address modern threats. By revisiting emerging attack techniques and identity-driven security controls, the presentation demonstrates how organizations can strengthen their resilience in modern environments.
*Please note that you register for a session through the general registration.
Slides from the presentation will be visible on this site if the speaker in question wishes to share them.
Please note that you need to be signed in in order to see them.