Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
with Marc Maiffret, Chief Technology Officer; James Maude, Director of Research
With increasing numbers of high-profile identity security attacks hitting the headlines, it is crucial to consider how to safeguard your organization. In today's attacks, identities, especially those with significant privileges, play a central role as attackers focus on exploiting identities and using social engineering instead of relying on exploits and malware.
Watch BeyondTrust’s Chief Technology Officer, Marc Maiffret and Director of Research, James Maude as they break down some of the common Tactics, Techniques, and Procedures (TTPs) that have been observed in recent Identity and Identity Infrastructure attacks including those that led to the discovery by BeyondTrust that Okta’s Support Unit had been breached.
In this session learn about:
Successfully navigating the challenges of identity security not only calls for tools that can provide visibility, control over identities and privileges, risk reduction, and threat detection, but also requires a shift within the organization to connect the realms of identity, access, and security. While Super Admins in Okta may be making headlines now, they are just one piece of a larger ecosystem that we must safeguard.
Don't miss out on this opportunity to enhance your understanding of identity security and learn valuable strategies to protect your organization.
As Chief Technology Officer, Marc Maiffret is responsible for leading BeyondTrust’s product strategy and leading the global engineering organizations to address market needs in intelligent identity and access security. Maiffret is a well-known entrepreneur and executive with over 20 years of experience in security leadership at organizations such as eEye Digital Security, FireEye, SpaceX, and BeyondTrust. Maiffret founded his first company shortly after being raided by the FBI at the age of 17. As a security researcher, Marc was an early pioneer in Microsoft vulnerability research, including co-discovering and naming Code Red, the first Microsoft computer worm. Marc has presented at numerous security conferences and has testified before Congress on matters of national security. As an entrepreneur, Marc helped design and build some of the first products for Vulnerability Management, Web Application Firewalling, Endpoint Security, and Malware Detonation. Marc has written for numerous publications and is regularly sought after by media organizations to break down complex security topics.
James Maude is the Director of Research at BeyondTrust’s Manchester, U.K., office. James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.