Identity & Access Management , Security Operations

So, Identity is the New Perimeter. Why is it so Hard to Defend?

How and why identity infrastructure has become a key attack surface.

The rise of public cloud infrastructure and remote work have weakened network-based models of security. The network-first models have been replaced by the tenets of Zero Trust and Least Privilege. A core component of Zero Trust is placing user identity and associated entitlements at the center of security. It is now common to hear the refrain: ”Identity is the new perimeter.”

But, if identity is the new perimeter, why are we struggling to defend it? In the last 18 months, hackers have leveraged identity-based attacks to accomplish high profile and costly attacks on major brands. To help organizations bolster their identity perimeter, this webinar will cover core concepts of modern identity infrastructure and how attackers are targeting those components.

In this webinar, you will learn:

  • How and why identity infrastructure has become a key attack surface
  • Methods that attackers are using to target identity
  • Key controls that can be put in place to strengthen the identity perimeter

About the Author

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from the North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.