Preempt Blog

The latest insights and advice to keep your company protected from insider threats and breaches

Security Weekly Interview: Securing Identity With Conditional Access

Organizations often have incomplete views of who is accessing what, when, where and how across multiple applications and systems. Understanding a user and their behavior is critical to understanding corporate security risk. In an interview in Security Weekly‘s Business Security Weekly July 22 podcast, Preempt CEO Ajit Sancheti explains why organizations need to secure identity with conditional access, which allows security teams to take the appropriate remediation steps based on the level of risk.


Ajit’s conversation with Matt Alderman, CEO of Security Weekly, and Paul Asadoorian, CEO of Countermeasures, goes into  how organizations need to change the roles of the IT, Security, and DevOps teams to address the growing security concerns and how identity data is critical to understanding the threat landscape.

Watch or listen to the podcast to learn:

  • Why identity is now a critical part of the security team and which identity data sources have better fidelity than others
  • How your SSO, MFA, PAM, and other identity sources fit into your machine learning models
  • Why automation is key to resolving security incidents and reducing administrative and IT burden
  • How to build policies without causing user fatigue
  • How to get instant insights into your network with Preempt Lite

Watch above for the interview, or visit Preempt’s page at Security Weekly.

Topics: Conditional Access, Identity, Identity Verification, Incident Response, Insider Threat,

Posted by Monnia Deng on July 23, 2019 11:31 AM

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More

Developer

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus...

Read More

Events

A Simplified Approach to Network Segmentation

Network segmentation has long been one of the most valuable tools for protecting ...

Read More

Research

10 Things You Need to Know About Kerberos

As our research team continues to find vulnerabilities in Microsoft that bypass all major

Read More

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More