Through the Lens of ISMG: Identity Security in Cyber Defense at #RSAC2024 | Edition 71

Through the Lens of ISMG: Identity Security in Cyber Defense at #RSAC2024 | Edition 71

As organizations face the threat of emerging and sophisticated cyberattacks, security vendors introduce innovative tools to defend their businesses. Over time, many security teams have amassed hundreds of these tools, leading to increased complexity in threat detection and analysis rather than improved security.??

Effective data protection involves not only safeguarding information but also implementing robust identity controls. Moreover, the surge in ransomware attacks has made identity systems more crucial than ever.??

From "securing identity systems" to "the role of identity in network security," here is a pick of interviews from #RSAC2024 that delve into enhancing identity security to maintain the integrity and continuity of organizational processes in the face of growing cyberthreats. Don’t forget to tune in to our ISMG Media Network to watch more than 160+ interviews that we recorded LIVE at #RSAC2024!??


The Blurring Personal-Professional Executive Risks of a CISO?

As nearly half of more than 500 CISOs reported cyberattacks on the personal lives of their executives, Chris Pierson, founder and CEO of BlackCloak, discusses the growing prevalence of hackers targeting individual employees - and skirting the strong protections of large enterprises.??


The Role of Identity in Network Security?

In response to new attacks, many security organizations have acquired hundreds of security tools, making detection and analysis difficult. That’s why "identity is a key component in the platform," said Tom Gillis, SVP and GM of Cisco Security.

These days, customers want "integrated solutions from a single vendor that looks across multiple domains, and this is where we think identity is a key component in the platform," he said.

Next-Generation Identity Platforms to See Sizeable Adoption?

Organizations recognize the need for robust identity platforms to protect data and apply controls. With so much data being generated and processed, the market is going to experience a proliferation of next-generation identity platforms, said Alberto Ye?pez, co-founder and managing director, ForgePoint Capital.


Rising Cybersecurity Threats: Focus on Identity Protection?

David Bradbury, chief security officer at Okta, discusses the shift in the cyberthreat battleground, and the effect of artificial intelligence technology on identity protection.

"Hackers no longer try to hack through a login page. They have moved focus to the post-authentication phase, where they're targeting employees; they're targeting individuals," he said.?

AI and Passwordless Systems: The New Era in Cybersecurity?

As cyberthreats continue to evolve, organizations are increasingly turning to advanced technological solutions to mitigate risks. Kris Burkhardt, CISO, Accenture, discusses how organizations are adopting passwordless systems and using generative AI to bolster their defenses.??


Identity Systems: Attackers' Keys to the Kingdom?

Mickey Bresman, co-founder and CEO of Semperis, discusses why ransomware actors increasingly target identity systems and backup files.

"Once I have breached your identity system and I own your identity system, I can access anything in the organization. And if I take down the identity system, the organization is completely disabled. You cannot do anything because you cannot authenticate, meaning you cannot access any of your applications, no matter if on-premises or in the cloud," he said.?

Identity-Based Cyberattacks in the Age of AI Proliferation?

Emerging technologies such as artificial intelligence are having a profound effect on the security landscape. Organizations can combat emerging threats by better understanding their own networks, staying vigilant and constantly innovating.


Upcoming #ISMGEvents

SEA Summit (Virtual)

ISMG’s SEA Cybersecurity and Business Transformation Summit (Virtual) centered around the theme, “Leadership, Strategic Innovation and Cybersecurity Defense,” addresses the key challenges that IT and security leaders face. The event aims to explore the implications of these challenges and offer strategic and tactical approaches to implement technologies and employ robust defenses to protect critical systems from cyberattacks.

Join us for two days of gripping insights and diverse trends. On Day 1, we shall discuss the ever-evolving landscape of cybersecurity and on Day 2, the business of IT, from innovation to technology and best practices.

Register Now!


The Cybersecurity Summit: North America Midwest

The Cybersecurity Summit: North America Midwest offers a pivotal day of advanced cybersecurity learning and dialogue, catering to a diverse audience of professionals in cybersecurity, manufacturing, and beyond.

Highlights of the summit include a distinctive tabletop simulation on Deep Fakes, led by the United States Secret Service and CyberEdBoard Community, exploring the intricacies of protecting digital ecosystems from advanced threats, and a deep dive into trending topics such as #operationaltechnology, third-party risk management, and #fraudprevention.


That's all for today. We will be back next week.

Until then, stay current with the latest happenings in cybersecurity by subscribing to our newsletter.

Have a nice day ahead.

- ISMG Social Media Desk

Thank you for including us!

要查看或添加评论,请登录

Information Security Media Group (ISMG)的更多文章

社区洞察

其他会员也浏览了