Early-bird Discount
expires in
Register Now


Threat Detection

Threat Detection

Combined Session
Wednesday, June 05, 2024 11:00—12:00
Location: A 05-06
Log in to download presentations

How are Cybercriminals still Compromising Identity and Breaching Organizations after all These Years?

Watch the video


The role of identity continues to be in high focus for defenders and attackers alike. While Identity and Access Management systems have improved greatly with the increased usage of MFA, PAMs, federated identity, AD & Azure AD, and detection and response systems such as EDR, SIEMs and XDR, successful, massive breaches leveraging identity still are occurring regularly. Why? How? In many organizations there are major vulnerability and detection gaps between primarily preventive IAM controls and increasingly common attacker tools and techniques that circumvent them. This is most evident post initial compromise where more sophisticated attackers show off their skills in the middle of the attack chain to move laterally and escalate their privileges on their way to the organization’s crown jewels. As with every attacker move there is a defender counter move. This has led to the emergence of identity threat detection and response (ITDR) solutions. Can ITDR solutions and associated security processes break the middle of the attack chain?

Matthew Gardiner
Product Manager
Matthew Gardiner has more than 20 years’ experience as a technical product & marketing executive with enterprise focused IT security products, starting with Netegrity and now working on...
Safeguarding Digital Identities in Today's World

Watch the video


Our digital world is connected more than ever, not just with technology but also with our digital identities. Stories about hackers, data breaches, and security flaws are all too common today. In this interconnected digital space, Identity and Access Management (IAM) is a big deal. It helps manage who gets access to what, especially in a time when our digital identities are targets for cyber threats.

Keeping our online identities safe is super important because it's where our personal and work lives meet. Bad actors, like hackers and data breaches, try to take advantage of this. That's why we need a strong plan called Identity Threat Detection and Response (ITDR).

ITDR isn't just a tool; it's a mix of technology, ways of doing things. This presentation looks into how ITDR works and why it's super important in modern cybersecurity. ITDR has four main parts: making a basic identity plan, finding risks, spotting problems quickly, and having ways to respond. All these parts help keep our identities safe and protect important data. 

Fadi Daood
Fadi Daood, an experienced Information Security architect specializing in identity and access management, leads PwC's Zero Trust Practice in PwC EMEA.
Most Dangerous Attack Techniques on Consumers and Enterprises and How to Protect Yourself

Watch the video


In the digital age, cyber threats loom large, targeting both consumers and enterprises with increasingly sophisticated attack techniques. In this session, we will delve into some of the top attack techniques used by hackers to gain access to sensitive information and cause harm to you. We will demonstrate real-world exploits, showcasing the critical security flaws that every organization and user must be aware of, and help you choose the right set of solutions to fortify your defenses.

Anirban Mukherji
Founder & CEO
Chief Architect and CEO of miniOrange which is a 12 year old company in Identity and Access Management with 25000 customers in more than 60 countries. The company miniOrange is based in India and...
Navigating the New Frontier: Identity Threat Detection and Response (ITDR) in Modern Security Landscapes

Watch the video


A significant trend in cybersecurity breaches is the shift from targeting endpoints to hijacking user identities. This evolution marks a significant change in attack vectors, emphasizing the need for robust Identity Threat Detection and Response (ITDR). The presentation will delve into the dynamics of this trend, elucidating the mechanisms through which attackers infiltrate systems by exploiting identity vulnerabilities instead of traditional hardware or software loopholes.

In response to the increasing focus on identity-based threats, there has been a paradigm shift in organizational structures and workflows. Identity & Access Management (IAM) teams are no longer siloed entities; they are increasingly integrated with Security Operations Centers (SOC). This presentation will explore the multifaceted implications of this integration. Attendees will gain insight into how the fusion of IAM and SOC functions is reshaping security strategies, fostering a more resilient, proactive defense against identity-based attacks.

Topics covered will include the evolution of ITDR tools and techniques, the role of artificial intelligence in predicting and mitigating identity threats, and the critical importance of fostering a culture of security awareness throughout the organization.

Mike Neuenschwander
VP KuppingerCole US and Global Head of Research Strategy
KuppingerCole Analysts AG
Mike has 25 years of experience in identity, access management, privacy, and security technologies, stemming from his time at Novell (now OpenText) where he introduced some of the first identity...
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch