Blueprint: Build the Best in Cyber Defense cover image

James Rowley: Creating and Running an Insider Threat Program

Blueprint: Build the Best in Cyber Defense

00:00

Cloud Access Security Brokers

A, largely the same stuff that we're concerned even without the inside or theatthing from happening. You have a fido, you have aino, single sign on. And so having an identity solution that allows you to tie it back to some kind of federated user via some single sign on i's absolutely huge. There are many times with access your identity solution has been taken and used for 30 days by someone who doesn't live there. Those people can be identified using kins tokens which allow them to suspend accounts if they don't meet certain criteria. A, when it comes to trying to figure out where this person was tring to ramble through our organization  it's not

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app