In this presentation, SailPoint’s CTO & CISO will discuss why Identity and Access Management has evolved to become a key control at the center of security operations. He will present the anatomy of a typical cyber breach, and will highlight how the “IAM Cyber Kill Chain” plays its part in a modern attack. From this viewpoint, Mr. Rolls make a clear case for putting Identity at the center of cyber defense and creating an integrated approach to governing privileged access.
Hacking into a Power Station is something that is a scary thought about the possibility of someone being able to turn off the power or damage systems. We have seen major incidents in previous years in which the Ukrainian energy sector was hit by a cyber-attack that caused a power outage for more than 86,000 homes.
This session is a real-world hack into a power station that explains the process on planning and preparation, the major challenges of hacking into a power station, adapting to the risks, the perimeter security, engines and SCADA controls. The session will reveal some of the amazing security as well as some of the most shocking findings that will surely see people put hands on their face. It will share the challenges on reporting the findings to the board and the lessons learned.
It is critically important to know how cybercriminals target their victims, what you can do to reduce the risk and make it more challenging for the attackers who steal your information, your identity or your money or even turn off the power. This session explains how outside attackers or malicious insiders can exploit vulnerabilities using examples such as a compromised email account password that escalates into a full-blown breach of network security.
1. Insights into hacking a power station
2. This session describes the anatomy of a privileged account hack
3. How cybercriminals target their victims
4. Reporting Risks to the board
5. What you can do to reduce your risk and prevent abuse of your critical information assets
Speed, ease, intelligence and security are differentiating the next wave of identity and access management solutions in the market. Organizations are counting on APIs for broader access to increasingly sensitive data and services. They’re also using a variety of disruptive technologies to secure and scale their API infrastructures, ensuring customer data and sensitive IP are never at risk. Join us for a presentation around some of the modern and innovative technologies coming out of Ping Identity that intersect both IAM, API and cyber security practices, and how modern solutions are leveraging AI and machine learning to monitor your API transactions, help secure customer data, manage customer consent, enforce data access governance, and achieve regulatory compliance while simultaneously improving customer engagement.