2024 CSEL Conference Programme

Subpage Hero

  

Loading

Lessons Learned from Catastrophic Identity-based Attacks: The Unified Power of PAM, CIEM, and ITDR

06 Mar 2024
Cloud & Cyber Security Expo Keynote Theatre

The MGM '23 attack caused over 100M$ in losses and halted some of their operations. The Uber '22 attack resulted in complete loss of control of all apps and services. What is common to both attacks is that they were both Identity-based attacks. Existing identity security measures are ineffective for securing your cloud from a determined adversary. With a single credential and a bit of gumption, an attacker can utilize misconfigurations in your IAM and evade via blind spots in identity infrastructure and detection tools to compromise multiple systems across your environments.
Embark on a transformative journey with Delinea, as we delve into the unified force of PAM (privileged access management), CIEM (cloud entitlement management), and ITDR (identity threat detection and response).
Using the real-life examples of Uber and MGM, this session will cover:


· Common gaps in IAM security from MFA/SSO to IdPs and in between
· How to protect yourself from such attacks
· How attackers manipulate IdPs and other IAM configurations to establish persistency and escalation privileges

Speakers
Gal Diskin, VP, Identity Threat & Research - Delinea

2024 Partners

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Media Partner


 

Security Education Partner


 

Media Partner


 

2024 SPONSORS

Platinum Sponsors


Diamond Sponsors


Gold Sponsors


Silver Sponsors


Theatre Sponsors


Securing The Cloud Stream


 

Conquering The Evolving Threat Landscape Stream

  

Building A Blueprint For Trust Stream


 

The Future of Cyber Security Stream


 

Fortifying Industry 4.0 Stream


 

GET THE LATEST INDUSTRY NEWS IN YOUR INBOX!