Leveraging Identity Data in Cyber Attack Detection and Response

  • Sponsored by: Okta
  • Released: Feb 02, 2021

As organizations break away from traditional network-based security concepts, where zones are delegated “trusted” or “untrusted,” to people-centric security models like Zero Trust, identity is becoming intrinsically linked to security. In fact, identity data can help security teams determine whether users or organizations are being subject to a cyber attack. This whitepaper will outline what and how identity data can be used as an indicator of a cyber attack, as well as ways to respond to incidents using Identity and Access Management (IAM) systems.

Leveraging Identity Data in Cyber Attack Detection and Response

Thank You!

Your download will start momentarily,

to download manually!