Using CIAM to Disrupt the Economics of Attackers
Deception for crime or warfare is an established tactic used by attackers, probably as old as humanity. Even in today’s online world, fake and stolen identity are primary routes for attackers to gain unauthorized access to an organization's digital assets, networks, or systems. In fact a recent report found that 79% of organizations have experienced an identity-related security breach in the last two years.

Reliably establishing and authenticating the identities of those we choose to trust online enables us to keep attackers out, or minimize their access and impact if they are already in the network. But the additional challenge for business is to reduce the economic viability of attackers gaining access while simultaneously ensuring our barriers do not hinder those who need and are entitled to access - our staff, existing or new customers, including those registering for the first time.

In this session we will look at how Customer Identity and Access Management systems can be used to increase the cost to attackers of falsifying an identity while ensuring secure access for legitimate users
Jameeka Green Aaron
Jameeka Green Aaron
CISO

Auth0
Tony Morbin
Tony Morbin
Executive News Editor

ISMG
Watch a brief video on the topic.
June 28, 2022 | 04:00 - 05:30 pm EDT

ISMG Brands

ISMG’s 30 global media properties provide security professionals with industry and geo-specific news, research and educational events.

June 28, 2022 | 04:00 - 05:30 pm EDT

Using CIAM to Disrupt the Economics of Attackers