InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Beyond Boundaries: Revolutionizing Identity Security from On-Premises Environments to the Cloud

Presented by

Kevin Tsuei SVP Information Security Officer, Commercial Bank of California | Director, Product Marketing, Identity Protection

About this talk

Five of the top 10 MITRE ATT&CK® techniques observed from July 2023 to June 2024 were identity-based. As identity-based attacks become a critical threat in cloud environments, mastering an identity-centric security strategy is imperative. Join us and Kevin Tsuei, SVP Information Security Officer at the Commercial Bank of California and Venu Shastri, Director of Product Marketing at CrowdStrike to learn why considering a unified identity protection strategy covering both on-prem Active Directory and cloud identity providers like Entra ID is critical to protecting against modern adversaries. Main Takeaways: • What is unified identity protection • Hear the latest innovations on identity security from Fal.Con 2024 • Why CrowdStrike’s unique platform approach provides a better and more cost-effective solution against identity breaches spanning on-premises and cloud environments • Listen to a real-world customer case study – Commercial Bank of California, covering best practices
CrowdStrike

CrowdStrike

36124 subscribers243 talks
Insightful, education and actionable content for security teams
CrowdStrike has redefined security with the world’s most advanced cloud-native platform for protecting critical areas of risk — endpoints and cloud workloads, identity, and data. The Falcon® platform harnesses real-time threat intelligence and enterprise telemetry to automate threat prevention, detection, remediation, hunting, and vulnerability observability through a single, intelligent, lightweight agent.
Related topics