InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Semperis Presents: Strengthen Operational Resilience with ITDR

Presented by

Itay Nachum, Director, Product Management, Semperis

About this talk

Operational resilience today depends on your ability to prevent and quickly recover from disruptions caused by cyberattacks. As Gartner notes, “misused credentials are now the top technique used in breaches…. attackers are targeting Active Directory and the identity infrastructure with phenomenal success.” Active Directory (AD) has long been a prime attack vector because of security vulnerabilities and misconfigurations that cybercriminals love to exploit. But by deploying a strong Identity Threat Detection and Response (ITDR) strategy, you can identify and address AD and Azure AD vulnerabilities, hardening your defenses against identity-related attacks and improving operational resilience. What You Will Learn – Why ITDR is key to operational resilience. – Common tactics that threat actors use to target AD/Azure AD as an entry point into your environment. – How to detect vulnerabilities in hybrid AD environments, including indicators of exposure (IOEs) and indicators of compromise (IOCs). – How to guard against attacks that bypass traditional logging methods. – How to ensure, a fast, clean AD forest recovery post-attack.
Identity Defined Security Alliance

Identity Defined Security Alliance

9439 subscribers160 talks
Vendor-neutral talks on reducing the risk of identity-related breaches
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.
Related topics