Mitigating Risk in Real-Time with an Identity Aware Approach

Logo
Presented by

Leslie K Lambert, Lambert ASAP, LLC | Homayun Yaqub & Carolyn Ford, Forcepoint

About this talk

In today’s decentralized workplace, it’s a challenge to safeguard people connecting via personal devices and to protect the data they are working with remotely and in the cloud. We can use Identity Access Management (IAM) to onboard employees with legitimate credentials onto the network—but authenticating and authorizing users isn’t enough to ensure that everybody is acting in our best interests … or is even who they say they are. Learn how to best protect against compromised identities and how Zero Trust can secure enterprises from the risky behaviors of different users so you can shift left of breach, with tools and tactics including: - Multi-factor authentication, single sign-on, and other Unified Access Management (UAM) functions  - Continuous, automated analysis and scoring of user behavior to identify risky users - Automated, dynamic responses to risky behavior ranging from warnings and credential checks to limited or full blocking of user access and data usage Presenters: Leslie K Lambert, Chief Executive Officer, Lambert ASAP, LLC Homayun Yaqub, Global Security Strategist, Forcepoint Carolyn Ford, Cybersecurity Research Manager Forcepoint
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (270)
Subscribers (35077)
To enable users to work anywhere, we must put data protection at the center of cloud and network security strategies. In this channel, we explore the latest technologies, security trends and frameworks like Zero Trust and SASE to help you not only determine where you are, but also what you still need to do to protect your business. Get the materials and building blocks you need to implement a data-first SASE architecture. See for yourself. https://www.forcepoint.com/sase