Most recent breaches have a common thread: They start with an identity-based attack as the initial vector. In fact, credential compromise and phishing are two of the most common initial attack vectors among breaches. With the acceleration of digital transformation, cloud adoption, and an increasingly hybrid workforce, the traditional network perimeter is no more. Identity (users, devices, applications) is the new perimeter.
In this webinar we’ll explore:
• A few of the recent identity-related breaches in the news along with the tactics, techniques, and procedures (TTPs) involved in these attacks
• How you can help protect your organization from attacks by defending against these TTPs
• Why you need to secure your existing identity provider (IDP) with high assurance phishing-resistant, MFA bypass-resistant authentication