Learn how to best protect your organization against identity-based attacks
In collaboration with Okta, we'll walk you through how to better protect your organization against identity-based attacks. Techniques like phishing, credential stuffing and password spraying are aimed not just at technology but at exploiting human weaknesses.
Watch the webinar and discover:
How cybercriminals leverage identities to penetrate systems.
The most commonly used attack methods and the reasons why they are so effective.
Technologies and strategies to strengthen your organization's defenses against identity-based threats.
The most commonly used attack methods and the reasons why they are so effective.
Technologies and strategies to strengthen your organization's defenses against identity-based threats.
Details
When it suits you
26 minutes
English
Fill in the form and watch the webinar:
Our expert
Arne Vedø-Hansen
IAM architect
Arne is an IAM architect and consultant with solid experience in the design, implementation and management of identity and access management (IAM) systems.
He has extensive experience with a variety of IAM platforms and has implemented solutions for companies in healthcare, shipping, retail, education and NGOs.
He has extensive experience with a variety of IAM platforms and has implemented solutions for companies in healthcare, shipping, retail, education and NGOs.