Early-bird Discount
expires in
Register Now

Agenda

Fortress Identity

Fortress Identity

Track
Wednesday, June 05, 2024 11:00—13:00
Location: A 05-06

The "Fortress Identity" track is dedicated to dissecting the critical nexus of identity management and security. In an age where digital identities are as valuable as physical assets, safeguarding them against escalating threats and vulnerabilities is paramount. This track explores innovative strategies, technologies, and frameworks to fortify identity systems. Join industry leaders and security experts as they navigate the complexities of authentication, authorization, and identity assurance, offering insights into building resilient, trustworthy identity ecosystems that stand firm against the tides of cyber threats.

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.

Participants will earn 2 CPE Credits for this track

After attending this track, participants will be able to:

  • Identify how to improve Zero-Trust in a multi-workload environment
  • Describe Zero Trust Network Access (ZTNA)
  • Recognize how implementing ITDR can enhance organizational security
  • Discuss innovative strategies, technologies, and frameworks to fortify identity systems.

Field of Study: Information technology
Prerequisites: Experience in the field of Information Security
Advance Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, book your Conference Ticket here.
In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE credits, please fill and submit the CPE application form after the conference.
After we have checked your attendance, you will receive your CPE certificate.

Refunds and Cancellations:
There will be no fees for cancellations up to 30 days before the beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50% of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.  
For more information regarding refunds, complaints, and/or program cancellation policies please contact our Events team via eventsteam@kuppingercole.com


Moderation

Lead Analyst & CTO
KuppingerCole
Lead Analyst
KuppingerCole

Sessions

June 05, 2024
11:00 - 11:15
How are Cybercriminals still Compromising Identity and Breaching Organizations after all These Years?
The role of identity continues to be in high focus for defenders and attackers alike. While Identity and Access Management systems have improved greatly with the increased usage of MFA, PAMs, federated identity, AD & Azure AD, and detection and response systems such as EDR, SIEMs and XDR, successful, massive breaches leveraging identity still are occurring regularly. Why? How? In many organizations there are major vulnerability and detection gaps between primarily preventive IAM controls...

Proofpoint


June 05, 2024
11:15 - 11:30
Safeguarding Digital Identities in Today's World
Our digital world is connected more than ever, not just with technology but also with our digital identities. Stories about hackers, data breaches, and security flaws are all too common today. In this interconnected digital space, Identity and Access Management (IAM) is a big deal. It helps manage who gets access to what, especially in a time when our digital identities are targets for cyber threats.Keeping our online identities safe is super important because it's where our personal and work...



June 05, 2024
11:30 - 11:45
Most Dangerous Attack Techniques on Consumers and Enterprises and How to Protect Yourself
In the digital age, cyber threats loom large, targeting both consumers and enterprises with increasingly sophisticated attack techniques. In this session, we will delve into some of the top attack techniques used by hackers to gain access to sensitive information and cause harm to you. We will demonstrate real-world exploits, showcasing the critical security flaws that every organization and user must be aware of, and help you choose the right set of solutions to fortify your defenses.

miniOrange


June 05, 2024
11:45 - 12:00
Navigating the New Frontier: Identity Threat Detection and Response (ITDR) in Modern Security Landscapes
A significant trend in cybersecurity breaches is the shift from targeting endpoints to hijacking user identities. This evolution marks a significant change in attack vectors, emphasizing the need for robust Identity Threat Detection and Response (ITDR). The presentation will delve into the dynamics of this trend, elucidating the mechanisms through which attackers infiltrate systems by exploiting identity vulnerabilities instead of traditional hardware or software loopholes.In response to the...

KuppingerCole Analysts AG


June 05, 2024
12:00 - 12:15
Improving Zero-Trust in a Multi-Workload Environment
In today's multi-workload / micro-service environments there are client authentication mechanisms to protect communication between services. This provides consistent server-to-server trust but does not address the protection of a transaction as it traverses through the different workloads. This talk will discuss the recently adopted Transaction Token draft, in the IETF OAuth working group, which defines a mechanism to protect the immutable data of a transaction, protecting it as the...

Capital One


June 05, 2024
12:15 - 12:30
Zero Trust Network Access - Market Overview
As businesses embrace Digital Transformation and become increasingly cloud-native, mobile, and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate protection from these threats. Unlike traditional perimeter-based security models that assume trust within the network, Zero Trust Network Access (ZTNA) adopts a more granular and identity-centric...

KuppingerCole


June 05, 2024
12:30 - 12:45
From Zero Trust to Identity Threat Detection and Response: Insights into Lessons Learned, Best Practices and Bad Ideas
This session delves into the evolving cybersecurity landscape, focusing on the transition from Zero Trust frameworks to Identity Threat Detection and Response (ITDR). A central theme is how ITDR aligns with Zero Trust principles to effectively mitigate risks. Participants will explore key considerations for implementing ITDR, uncovering how it plays a pivotal role in enhancing organizational security. The session will illuminate potential challenges and pitfalls encountered in global ITDR...

iC Consult Group GmbH


June 05, 2024
12:45 - 13:00
From Firefighters to Business Enablers: Embracing Zero Trust as a Strategy
Think back to the '90s when computers at work were mostly used by employees. Today, things are different. Everyone and everything—partners, suppliers, and all our devices—are all connected. But surprisingly, our way of protecting who can access what hasn't changed much. Let's talk about how our world has evolved so much, yet our methods to keep things safe have stayed behind.  This talk dives into why we need a fresh approach—Zero Trust. It's a way to move from just...



Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch