When examining the recent breaches and the associated APT’s, majority if not all of them points to a single gap – Unauthorized use of privileges. Call it governance gap, lack of access control or in-efficient threat identification, the end result usually is a breach leading in to sensitive data loss.
How can one quantify the risk due to lack of user identity focussed initiatives ?
Why identity attributes are crucial in assessing level of access and there by the Persistence of a Threat profile?
How can businesses quantify these threats by proper monitoring of relevant Attributes of an Identity?
This session focuses on redefining the threat landscape due to lack of governance and control on Identity related Attributes that often result in to breaches, fraudulent actions and data loss.
This session examines general concepts, industry trends and case studies that will enable CSO/CISO and security community to stay ahead of eminent threat posed by cyber crimes.
- Threat landscape and relationship with Identity Management
- APT and relationship to Identity Attributes
- Case studies and scenarios where Identity Attributes are crucial
- How proactive ant-fraud strategies lack crucial investigative information
About Arun Kothanath
With 18+ years of experience in the security and technology field, Mr. Kothanath focuses on providing technology leadership involving security aspects to enterprises, start-ups and government entities. Mr. Kothanath has been pioneering cutting edge technology ideas leading in to enterprise strategies, product and technology development and research oriented activities nationally and internationally. Some of his focus areas include Identity Management, Fraud Management, Information protection and Risk management, GRC and Mobile security. Arun enjoys solving industry challenges and provide guidance to a variety of entrepreneurial initiatives.