Disclaimer: The speaker at this session has not been involved either directly or indirectly in the work in the aftermath of any of the Ransomware attacks described in this session. All of the information from the cases is based solely on data that is in public domain.
This session is about the connection between Ransomware attacks, Identity Management and the global dominance of the Microsoft Active Directory in Enterprises of any size. The session will try to add afterthoughts to what could have been done differently with the tools from inside the IAM toolbox. The speaker believes that the companies hit by Ransomware already did there best to avoid the attack, but even though it did happen. What can we learn, what could have been done differently and where will this brings us in the fight against future attacks?
As more and more organizations go multi-cloud, the question arises how to integrate existing and compliance-proven enterprise IAM processes with the upcoming requirements of managing identity in the clouds. |
The dynamic nature of cloud environments requires a frictionless user experience when it comes to providing and retrieving access
There is no one size fits all - the best solution for your organization depends on your positioning within a large spectrum between agility and control
Implementing a declarative approach for your multi-cloud IAM is a essential when aiming for continuous compliance