У нас вы можете посмотреть бесплатно Securing Every Identity in the Hybrid Era: Building a Unified Strategy Across Cloud, On-Prem, and AI или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
As hybrid IT becomes the new normal, identity has become both the connective tissue - and the weakest link - of modern enterprise security. This presentation with Microsoft MVP Nick Cavalancia and Roy Akerman, VP of Identity Security Strategy at Silverfort, explores how organizations can unify identity protection across on-prem Active Directory, cloud identity providers, SaaS platforms, and emerging AI agents. In this session, you’ll learn how to: Understand today’s hybrid identity landscape: Why fragmentation between on-prem AD, cloud IdPs, SaaS, and AI agents increases lateral-movement risk. Identify hidden threats and blind spots: Unmanaged service accounts, stale and orphaned admin users, and unmonitored non-human identities that attackers routinely exploit. Analyze real-world breaches: Lessons from the MGM Resorts and Storm-0501 attacks, showing how misconfigured trust relationships enable privilege escalation across cloud and on-prem. Visualize your full identity attack surface: Moving from static lists to dynamic identity graphs that reveal relationships, permissions, and hidden access paths. Operationalize unified identity protection: Mapping controls across AD, Entra ID, Okta, AWS, and SaaS to detect and block credential abuse in real time. Adopt identity threat detection and response (ITDR): See how graph-based visibility powers identity threat hunting, least-privilege enforcement, and faster incident response. Secure AI and machine identities: Govern the next wave of access expansion before it introduces new persistence paths for attackers.