IAM’s Place in your Breach Prevention Strategy
In recent years data breaches have become a common occurrence. What’s more surprising is how consistently these breaches occur. It’s not just the usual suspects of phishing, social engineering and insider threats; weak and stolen passwords are the majority cause (81% of the time per Verizon’s DBIR).
There’s no silver bullet for breach prevention, but there are excellent strategies to defend against today’s threat actors. In this session, we’ll unveil the findings of a research study from leading analyst firm IDG. You’ll learn:
- Challenges and priorities for IAM as a part of a breach prevention strategy
- Threats they’re most concerned about and the best way to defend against them
- How they’re identifying and responding to account compromise