Mitigating Cyber Risks
Facebook Twitter LinkedIn

The Anatomy of an IAM Cyber Kill Chain

Combined Session
Wednesday, May 15, 2019 15:30—16:30
Location: CHIEMSEE

In this presentation, SailPoint’s CTO & CISO will discuss why Identity and Access Management has evolved to become a key control at the center of security operations. He will present the anatomy of a typical cyber breach, and will highlight how the “IAM Cyber Kill Chain” plays its part in a modern attack. From this viewpoint, Mr. Rolls make a clear case for putting Identity at the center of cyber defense and creating an integrated approach to governing privileged access.

Key takeaways:

The Anatomy of an IAM Cyber Kill Chain
Presentation deck
The Anatomy of an IAM Cyber Kill Chain
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
David Lee
David Lee
Sailpoint
14 years typing letters and numbers into a computer screen and waiting for the magic to happen. Most of that time the magic was helping enterprises figure out how to manage all the accounts and...
Subscribe for updates
Please provide your email address