Hacking Identity: The Good, Bad and Ugly of Identity-Centric Security Controls

Logo
Presented by

Jerod Brennen, SailPoint Identity Strategy and Solutions Advisor

About this talk

Identity-related breaches have become ubiquitous. From phishing attempts, to social engineering to compromised privileged credentials, capturing a legitimate set of credentials and even better with privileged access, is every cybercriminals dream. Knowing your opponent and the methods they use to steal identities can be the first step in enhancing an enterprise security strategy with an identity-centric security focus that has resulted in fewer breaches for some companies. Join Jerod Brennen, currently a SailPoint Identity Strategy and Solutions Advisor, but formerly a pen tester who worked in SecOps developing a solid grasp of the good, the bad, and the ugly of enterprise identity security. For red teams, this presentation will cover pen testing tips and tricks to circumvent weak or missing identity security controls. For blue teams, we'll also cover the steps you can take to shore up your identity-centric security controls and catch pen testers in the act. Purple teaming, FTW!
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (101)
Subscribers (7512)
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.