Navigate the complex world of cyber threats with this track dedicated to understanding and countering diverse threat actors. Explore who these actors are, their motivations, and their methods.
Moderation
Sessions
December 04, 2024
11:35 - 11:55
Ransomware and DDOS and the contrary of those business models from a CISO perspective
December 04, 2024
11:55 - 12:15
Unmasking the Shadows: A Deep Dive into Threat Intelligence and Cyber Adversaries
December 04, 2024
12:35 - 12:55
PANEL: Turning Data into Defense: The Art of Actionable Threat Intelligence
December 04, 2024
12:55 - 13:15
Looking behind the curtain: Does your systems authenticate and authorize as you’d expect?
The increasing popularity of the term “Identity Security”, coupled with the explosive growth in the number of identity security vendors, bears testament to the fact that security starts and often ends with identity. But with so many tools, so many processes moving part making up the modern identity fabric, do you really know what is really happening behind the curtain and inside all that IAM infrastructure? Accounts are created, entitlements are assigned, users...