A Post Breach Analysis: Okta Support Unit
OnlineAbout the session With increasing numbers of high-profile identity security attacks hitting the headlines, it is crucial to consider how to safeguard your organization. In today's attacks, identities, especially those with significant privileges, play a central role as attackers focus on exploiting identities and using social engineering instead of relying on exploits and malware. Join BeyondTrust’s Chief Technology Officer, Marc Maiffret and Director of Research, James Maude as they break down some of the common Tactics, Techniques, and Procedures (TTPs) that have been observed in recent Identity and Identity Infrastructure attacks including those that led to the discovery by BeyondTrust that Okta’s Support Unit had been breached. In this session learn about: The growing importance of identity security in today's landscape Research findings on Mercury and Scattered Spider How BeyondTrust's proactive approach helped uncover the Okta Support Breach Okta post breach analysis – privileges and personal accounts Best practices for securing identity infrastructure, including FIDO2 and access policies Successfully navigating the challenges of identity security not only calls for tools that can provide visibility, control over identities and privileges, risk reduction, and threat detection, but also requires a shift within the organization to connect the realms of identity, access, and […]