A CISO’s Journey in Defending Against Modern Identity Attacks

crowdcast-image

ON-DEMAND

A CISO’s Journey in Defending Against Modern Identity Attacks

Ransomware, supply chain, and other modern security threats use identity based attacks as a key technique to infiltrate and move laterally in an organization. What does an identity attack look like? How do malicious actors move laterally? In this on-demand CrowdCast, Xoriant’s CISO has described examples of actual attacks, how they happened, and the process and tools used to detect, remediate, and prevent future attacks.

In this session:

  • Learn about attack techniques like kerberoasting, privilege escalation, and lateral movement
  • Walk through an attack to see how identity infrastructure and credential compromise occurs so quickly
  • Learn a CISO’s approach to detecting, remediating, and ensuring protection against future attacks
  • Understand how critical identity protection is for the success of larger initiatives like AD security and Zero Trust
  • Learn why Jay Kashyap relies on CrowdStrike as his identity protection technology partner

Watch this on-demand CrowdCast to learn more.