Wednesday, January 17, 2024

How to Defend Against Identity-Based Attacks

5:30 – 8:00pm PT | Vancouver, CA

Event Overview

Credential Stuffing. Phishing. Man-in-the-middle. These are just three of the increasingly common ways adversaries are targeting your organization with identity-based attacks.

And as these identity-based attacks become more prominent and sophisticated, security teams have to ensure that proper identity and access management solutions are incorporated into their security projects to thwart these attacks.

DISCUSSION POINTS

  • How is identity being exploited by attackers in today’s digitally-transformed enterprise? 
  • What are the challenges and barriers to implementing preventative measures? 
  • What modern solution options are available, and what’s best practice for effective implementation?

Moderator

Sunil Chand

CISO/CSO and Board Advisor

 

Teju Shyamsundar

Product Strategy

Okta

Speakers

Join Teju Shyamsundar, Product Strategy at Okta, to gain her unique insight on identity-based attacks, and come away with strategies you can implement today to improve your organization’s cybersecurity posture.

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Watch a brief introduction with Yuliya

Venue

Black+Blue Vancouver

1032 Alberni Street, 3rd floor, Vancouver, BC V6E 1A3

Underwritten by

Okta is the leading independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With more than 7,000 pre-built integrations to applications and infrastructure providers, Okta provides simple and secure access to people and organizations everywhere, giving them the confidence to reach their full potential. More than 10,000 organizations, including JetBlue, Nordstrom, Siemens, Slack, T-Mobile, Takeda, Teach for America, and Twilio, trust Okta to help protect the identities of their workforces and customers.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025