Wednesday, June 28, 2023

How to Defend Against Identity-Based Attacks

5:30 – 8:00pm EDT | Toronto, CA

Event Overview

Credential Stuffing. Phishing. Man-in-the-middle. These are just three of the increasingly common ways adversaries are targeting your organization with identity-based attacks.

And as these identity-based attacks become more prominent and sophisticated, security teams have to ensure that proper identity and access management solutions are incorporated into their security projects to thwart these attacks.

DISCUSSION POINTS

  • How is identity being exploited by attackers in today’s digitally-transformed enterprise? 
  • What are the challenges and barriers to implementing preventative measures? 
  • What modern solution options are available, and what’s best practice for effective implementation?

Moderator

Farooq Naiyer

Global Leader, Technology and Cyber Assurance

Munich Re

Yuliya Gorbunova

Senior Director, Product Management

Okta

Speakers

Join Yuliya Gorbunova, Senior Director,  WIC Product Management at Okta, to gain her unique insight on identity-based attacks, and come away with strategies you can implement today to improve your organization’s cybersecurity posture.

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Watch a brief introduction with Yuliya

Venue

E11even, Toronto

15 York Street, Toronto, ON M5J 2Z2

Underwritten by

Okta is the leading independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With more than 7,000 pre-built integrations to applications and infrastructure providers, Okta provides simple and secure access to people and organizations everywhere, giving them the confidence to reach their full potential. More than 10,000 organizations, including JetBlue, Nordstrom, Siemens, Slack, T-Mobile, Takeda, Teach for America, and Twilio, trust Okta to help protect the identities of their workforces and customers.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain

February 20, 2025

Managing Your Expanded Attack Surface Using Automation: The Security Promise

February 20, 2025

Securing the Modern Payment Rails

Upcoming ISMG Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain