Webinar March 18: An Encore Presentation of "A CISO’s Perspective on Conditional Access"

REGISTER NOW

Preempt Blog

The latest insights and advice to keep your company protected from insider threats and breaches

A CISO’s Perspective on Conditional Access

Why did 120 people stand for 20 minutes to hear one talk — and miss out on dozens of other talks, 50+ vendors, and all the Gartner IAM 2019 Summit had to offer?

Magic? Cool Preempt swag?

No, something even more in demand: Conditional access.

At Preempt Security’s showcase talk at the Gartner IAM Summit recently, Intralinks CISO Anjan Bagchee provided his perspective on how a security leader should plan, implement, and benefit from conditional access. The audience was committed because his was a hands-on, real-world perspective.

While we can’t fully replicate the examples and anecdotes Mr. Bagchee gave in his talk, we can provide a summary of what he recommended when embarking on a conditional access program. His talk outlined two basic phases:

  • Assess the current environment, and then
  • Evaluate a solution to fill gaps
Examining the gaps

While an organization may have numerous gaps, the focus on critical areas will accelerate risk reduction.

Specifically examine the risk associated with:

  • Privileged accounts
  • High-risk accounts
  • Understanding risky behavior

And then determine the effectiveness of conditional authentication already in place. In addition, it is important to inventory the visibility and risk levels of on-premesis and cloud user directories to ensure complete coverage.

“Be more proactive about threats that are targeting credentials.”- Anjan Bagchee, Intralinks CISO

Evaluating solutions

Users are the one of the most important assets in an organization. So while we seek to protect them and their activities, we also need to be careful not to introduce too much friction that will limit their core business function.

Considering this balance of usability and security, organizations should evaluate solutions for three areas:

  • How well does the solution show and understand the risk levels and activity of passwords of all accounts and more specifically privileged accounts?
  • Can the solution provide real-time, complex detection of anomalies? In other words, not waiting for SIEM analysis or post-event threat correlation.
  • How easy, but flexible, is the policy engine to adapting to the risks and unique elements of your environment?

In the talk, specific details around what visibility and adaptive responses would be required were discussed, along with examples.

Learn more

Judging by the interest in this talk, many organizations see conditional access as both reducing risk, as well as reducing friction associated with traditional security solutions.

If you would like to learn more about conditional access or obtain the presentation deck from the Gartner IAM Summit, please contact us.

Register for the live webinar encore presentation of this talk, in which Anjan Bagchee will go into more detail: Coming March 17.

REGISTER

Topics: Conditional Access, Privileged Accounts,

Posted by Kapil Raina on December 20, 2019 11:16 PM

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More

Developer

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus...

Read More

Events

A Simplified Approach to Network Segmentation

Network segmentation has long been one of the most valuable tools for protecting ...

Read More

Research

10 Things You Need to Know About Kerberos

As our research team continues to find vulnerabilities in Microsoft that bypass all major

Read More

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More