Securing the Identity Perimeter with Defense in Depth

Logo
Presented by

Jack Poller, Senior Analyst, ESG

About this talk

The core tenet of a zero trust strategy is least-privilege access. Yet, organizations continue to rely on user and machine identities that are susceptible to compromise, abuse and misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into who and what is using access and how. Vaguer is how identities should be monitored and protected. Availability of modern, cloud-managed identity services is widespread. However, organizations have been slow to pivot their security programs from traditional endpoint, network, and SecOps to an approach that focuses on identity orchestration and experiences, which is dynamic and distributed. Where there are no perimeters, a multitude of identity verification services and managed identity services exist. This research-led session will focus on how teams are responding, the identity security controls at play, and the strategies shown to be most effective.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (784)
Subscribers (198299)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.