Dec. 1, 2021 | 11:00 AM CST
With ransomware, malware, and other cyberattacks on the rise, business leaders are understandably concerned about mitigating risk of a catastrophic malicious attack. But one of the most common ways attackers are breaching organizations by compromising the core identity system is often considered the purview of operational teams, not cybersecurity teams.
This disconnect between cybersecurity practices and the seemingly routine configuration of identity systems can cause gaping security holes that attackers love to exploit. Especially for the vast majority of organizations that use Active Directory as their primary identity store, failing to secure the identity system creates open doors for cybercriminals. Active Directory is prone to misconfigurations and malicious changes that make it an easy target for cybercriminals. For companies that have shifted services to cloud providers such as Azure Active Directory the situation is hardly better. Many recent attacks (including SolarWinds) have started with on-premises entry points in Active Directory and then moved to the cloud, or started with Azure and moved on-premises.
This session will explore some strategic shifts that leaders can consider in order to harden their defenses against increasingly common attacks on identity systems, particularly Active Directory.