Overview

Corporate breaches continue to succeed because attackers can steal the legitimate identities of your employees and use those identities to attack your infrastructure. Far deadlier than malware based attacks, identity based attacks can go undetected for months or years because perpetrators impersonate the methods used by your various privileged accounts as if they were that user. Attackers have changed their methods from the now outdated malware based attacks to the evolved identity based attacks. Learn how analytics, deception, and data streams are saving the security industry, or would have at least saved the Democratic National Committee.

Speaker

Tom Merry, President Alliance HIM
Robert Johnston, Co-Founder & Cheif Executive Officer of Adlumin

CEU

1.0 – External Forces

Date Published

March 9, 2018