In Partnership with:
"We all have a unique identity. When translated to technology, we have more than one account associated with our identities, and threat actors target our accounts to infiltrate an environment. Identity Management Day helps consumers, employees, and businesses understand the risks to their identities if an account is compromised, along with the best practices for securing accounts from identity-based attack vectors. If you consider how many accounts an individual may have to perform their role within an organization, protecting users’ identities is one of the best strategies to prevent future security breaches." --Morey Haber, Chief Security Officer
What is Identity Management Day?
Identity Management Day is a day of awareness aimed to educate business leaders, IT decision-makers, and the general public about the importance of managing and securing digital identities. Organized and hosted by the Identity Defined Security Alliance (IDSA) and National Cybersecurity Alliance (NCA), Identity Management Day enables participants to share best practices, start conversations, and inspire individuals and organizations of all sizes to act, so that failure to implement basic identity management best practices doesn’t result in the next headline breach.
What are the Most Important Things We Learned?
1. Securing your identities starts with knowing what identities you have.
It isn't the identities and access you know about that pose the biggest risk--it's the ones you don't know about. The first step in addressing security risks related to privileged activity, such as potential credential compromise or malicious activity from inside or outside of your organization (insiders and third parties), is an assessment of the privileged accounts on your network. The Privileged Access Discovery application helps organizations of all sizes scan their networks and systems to securely illuminate unidentified privileged access risks so you can address them.
Click here to get started.
2. Securing cloud identities is different
The strategies you implemented to defend your on-prem environment aren't going to cut it when it comes to the cloud. Cloud Attack Vectors, co-authored by Morey Haber, Brian Chappell, and Christopher Hills, details the risks associated with cloud deployments, including the techniques threat actors leverage, the empirically-tested defensive measures organizations should adopt, and how to improve detection of malicious activity.
3. The more you know, the better you can equip your security infrastructure
Learn more about intelligent identity & access security topics by perusing our recommended reading list:
- What is Vendor Privileged Access Management (VPAM)? (blog)
- Password Cracking 101: Attacks & Defenses Explained (blog)
- Securing Machine (Non-Human) Identities (blog)
- How to Manage and Secure Service Accounts: Best Practices
- Top 6 Overlooked Identity Security Problems (blog)
- The Most Important Privileged Accounts to Discover & Why (blog)
- CIEM Explained: Managing Cloud Entitlements in a Multicloud World (blog)
- What is System for Cross-domain Identity Management (SCIM) & What are the Benefits? (blog)
Don't miss our recommended webcasts:
- A Practical Journey to Zero Trust with PIM (Privileged Identity Management) with Jessica Burn, Forrester Research, Inc. Senior Analyst
- Securing Cloud Identities
Here are our top-recommended whitepapers to help you in your identity and access security intiatives:
- Privileged Password Management Explained (whitepaper)
- Cybersecurity Survival Guide 2022 (whitepaper)
- Azure PIM vs BeyondTrust PAM (whitepaper)
- A Zero Trust Approach to Secure Access (whitepaper)
- Buyer's Guide for Complete Privileged Access Management (PAM) (whitepaper)