Breaking the Identity Perimeter: An Attacker’s Perspective

Logo
Presented by

Roey Rozi, Director of Solution Architecture at Oasis Security and John Yeoh, Global VP of Research, CSA

About this talk

The transition to cloud computing has diminished the effectiveness of traditional network security perimeters, rendering identity as the final line of defense against attackers. While enterprises have allocated substantial budgets to identity programs and have made significant progress in safeguarding human identities through the enforcement of multi-factor authentication (MFA) and centralization of control via single sign-on (SSO), the broader attack surface presented by non-human identities remains unaddressed. In this presentation, we will delve into the security of non-human identities, exploring the various methods attackers can employ to exploit them in order to breach cloud-based organizations. We will also discuss effective strategies to efficiently mitigate these risks.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (179)
Subscribers (17007)
Go in depth into CSA's latest research on everything from IoT to containers to blockchain. Webcasts will break down the research, provide use cases, instructions for implementation, and further insights.