On Demand Webinar

Hacking Identity: The Good, Bad and Ugly of Identity-Centric Security Controls

Hacking Identity: The Good, Bad and Ugly of Identity-Centric Security Controls

Jerod Brennen, SailPoint Identity Strategy and Solutions Advisor

Identity-related breaches have become ubiquitous. From phishing attempts, to social engineering to compromised privileged credentials, capturing a legitimate set of credentials and even better with privileged access, is every cybercriminals dream. Knowing your opponent and the methods they use to steal identities can be the first step in enhancing an enterprise security strategy with an identity-centric security focus that has resulted in fewer breaches for some companies.

Join Jerod Brennen, currently a SailPoint Identity Strategy and Solutions Advisor, but formerly a pen tester who worked in SecOps developing a solid grasp of the good, the bad, and the ugly of enterprise identity security. For red teams, this presentation will cover pen testing tips and tricks to circumvent weak or missing identity security controls. For blue teams, we’ll also cover the steps you can take to shore up your identity-centric security controls and catch pen testers in the act. Purple teaming, FTW!

Note: The IDSA is an approved (ISC)2 CPE Submitter Partner. To receive CPE credits, submit the viewing certificate to (ISC)2 or submit your information. Make sure to check out our other identity-centric security webinars from leading identity and security experts.

Related Webinars

On Demand Webinar

On Demand Webinar

It All Comes Back to Access: How to Establish Cloud Identity Security in 2024

Member Sponsor

On Demand Webinar

On Demand Webinar

The Broken State of Least Privilege: Reimagining a New Approach

Member Sponsor

On Demand Webinar

On Demand Webinar

Use Identity Convergence to Collaborate More Securely With External Partners

Member Sponsor
Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.