Posted on
in Presentations
Step into a DeLorean! This session will apply past lessons in hopes of a better future for identity threat detection and will review the top identity attacks observed in incident response over the past two years, highlighting the importance of collaboration between identity and access management (IAM), security operations, and cyber threat intelligence (CTI).
Share With Your Community