Diana Kelley, Microsoft I Joseph Carson, Thycotic I Roshan Sherifudeen, EY
About this talk
According to Verizon’s 2019 Data Breach Investigation Report, 80% of hacking-related breaches exploited either stolen or weak user passwords - and 29% of all breaches used stolen credentials regardless of attack type. Why are attackers focused on authentication systems, and what risk does this pose as our businesses move more sensitive data and applications into the cloud?
Join us as we explore what today’s attacker knows and how to balance defending your data with continuing to offer users and customers the agility they have come to expect.
As we realize the transformative power of the cloud, AI and machine learning, has our culture of responsibility and ethics kept pace? How do we harness our new technological capabilities to the understanding of how to use them well?…