Applying Past Lessons for Intel-Driven Identity Threat Detection


Posted on in Presentations

Step into a DeLorean! This session will apply past lessons in hopes of a better future for identity threat detection and will review the top identity attacks observed in incident response over the past two years, highlighting the importance of collaboration between identity and access management (IAM), security operations, and cyber threat intelligence (CTI).
Recommended Reading Available in Our Bookstore

The Mighty Threat Intelligence Warrior by Nicole Hoffman


Participants
Nicole Hoffman

Speaker

Security Investigator, Cisco Talos

Michael Marriott

Speaker

VP of Product Marketing, Harmonic Security


Share With Your Community