{"id":127478,"date":"2022-08-22T12:04:50","date_gmt":"2022-08-22T12:04:50","guid":{"rendered":"https:\/\/news.microsoft.com\/?p=446978"},"modified":"2022-08-22T12:04:50","modified_gmt":"2022-08-22T12:04:50","slug":"connect-with-microsoft-security-experts-at-the-2022-gartner-identity-access-management-summit","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2022\/08\/22\/connect-with-microsoft-security-experts-at-the-2022-gartner-identity-access-management-summit\/","title":{"rendered":"Connect with Microsoft Security experts at the 2022 Gartner Identity &amp; Access Management Summit"},"content":{"rendered":"<p>The transition to a remote and hybrid workforce happened fast during a time of uncertainty, and IT professionals rose to the challenge with ingenuity and dedication. But two years in, many IT teams are still responding with patchwork solutions to enforce identity and access management (IAM) across a newly decentralized, multiple-endpoint ecosystem. It\u2019s clear that new IAM strategies are needed to accommodate these major shifts in the workplace, as well as meet new organizational priorities and user expectations.<\/p>\n<p>In that spirit of discovery, we\u2019re looking forward to joining the IAM community at the <a href=\"https:\/\/www.gartner.com\/en\/conferences\/na\/identity-access-management-us\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Gartner Identity &amp; Access Management Summit<\/strong><\/a><strong>, August 22 to 24, 2022, in Las Vegas, Nevada<\/strong>. We\u2019ll be sharing some of Microsoft\u2019s recent insights about strengthening lifecycle and permissions management, stopping attacks on identity infrastructure, and moving to a cloud-based identity platform. With the recently announced <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-entra\"><strong>Microsoft Entra<\/strong><\/a>, <strong>identity threat detection and response (ITDR)<\/strong>, and our <a href=\"https:\/\/www.microsoft.com\/security\/business\/threat-protection\">security information and event management (SIEM) and extended detection and response (XDR)<\/a> solutions, we\u2019re committed to providing end-to-end protection for your organization. Be sure to visit <strong>Microsoft Booth #304<\/strong> and connect with our frontline defenders.<\/p>\n<h2>Gartner IAM Summit\u2014Microsoft sessions<\/h2>\n<p>We\u2019re excited to meet with our customers, colleagues, and peers at the 2022 Gartner Identity &amp; Access Management Summit. Microsoft will present three research-backed sessions led by senior product managers, including a special look at ITDR led by Alex Weinert, Director of Identity Security at Microsoft.<\/p>\n<figure class=\"wp-block-image size-medium is-resized is-style-default\"><img decoding=\"async\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2022\/08\/connect-with-microsoft-security-experts-at-the-2022-gartner-identity-access-management-summit.png\" alt=\"Balaji Parimi, Microsoft Partner Product Management\" class=\"wp-image-119888\" width=\"200\"><\/figure>\n<blockquote class=\"wp-block-quote\">\n<p><strong>Title: <\/strong>Manage, Secure, and Govern Identities Across Multicloud Infrastructures<br \/><strong>Speaker: <\/strong>Balaji Parimi, Partner General Manager<br \/><strong>Date\/Time:<\/strong> Monday, August 22, 2022 | 11:45 AM to 12:15 PM PT<br \/><strong>Synopsis<\/strong>: Going multicloud makes you more agile and resilient. But it also creates more complexity and blind spots for your security and identity teams. It\u2019s time to reimagine how we manage, secure, and govern identities, and enforce least-privileged access consistently across cloud platforms. In this session, we\u2019ll explore how cloud infrastructure entitlement management (CIEM) can strengthen your <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust<\/a> security in a multicloud world.<\/p>\n<\/blockquote>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"200\" height=\"200\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2022\/08\/connect-with-microsoft-security-experts-at-the-2022-gartner-identity-access-management-summit-1.png\" alt=\"Brjann Brekkan, Group Program Manager, Identity and Network Access\" class=\"wp-image-119903\"><\/figure>\n<blockquote class=\"wp-block-quote\">\n<p><strong>Title: <\/strong>Beyond the Firewall: Upgrading from On-Premises to the Microsoft Cloud Identity<br \/><strong>Speaker: <\/strong>Brjann Brekkan, Group Program Manager, Identity and Network Access<br \/><strong>Date\/Time:<\/strong> Monday, August 22, 2022 | 1:15 PM to 1:35 PM PT<br \/><strong>Synopsis<\/strong>: Today\u2019s new normal of \u201cwork from anywhere\u201d and \u201con any device\u201d has exposed the challenges of using on-premises authentication technologies and platforms as the control plane for enterprise applications and collaboration. You\u2019re invited to join the Microsoft Identity product group for this interactive session. We\u2019ll discuss the latest trends and platform capabilities to accelerate and simplify the journey of adopting a <a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\/identity-access\">modern cloud-based identity platform<\/a>.<\/p>\n<\/blockquote>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2022\/08\/connect-with-microsoft-security-experts-at-the-2022-gartner-identity-access-management-summit-2.png\" alt=\"Alex Weinert, Director of Identity Security\" class=\"wp-image-119900\" width=\"200\"><\/figure>\n<blockquote class=\"wp-block-quote\">\n<p><strong>Title: <\/strong>Identity Threat Prevention, Detection, and Response\u2014Essential Defenses for a New Generation of Attacks<br \/><strong>Speaker: <\/strong>Alex Weinert, Director of Identity Security<br \/><strong>Date\/Time:<\/strong> Tuesday, August 23, 2022 | 11:15 AM to 11:45 AM PT<br \/><strong>Synopsis<\/strong>: Attacks against identity infrastructure are accelerating. Instead of trying to compromise individual accounts, today\u2019s attackers seek to gain unrestricted access to multicloud environments and workloads wherever they\u2019re deployed. For that reason, protecting accounts is not enough\u2014organizations need robust protections for the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/05\/31\/secure-access-for-a-connected-worldmeet-microsoft-entra\/\">identity infrastructure itself<\/a>. In this session, we\u2019ll share how Microsoft envisions the future of ITDR, including what an effective identity and security collaboration should look like to help your organization grow fearlessly.<\/p>\n<\/blockquote>\n<h2>Bridging the IAM and SOC divide<\/h2>\n<p>Even as we approach another IAM summit, many organizations are still shocked to learn the reality of how most identity breaches occur. According to the 2022 Verizon Data Breach Investigations Report, <strong>65 percent of breaches are caused by credential misuse<\/strong>, while only 4 percent caused are by system vulnerabilities.<sup>1<\/sup> A full 82 percent of breaches involve the human element, including social engineering attacks, user errors, and data misuse.<\/p>\n<p>As I will discuss in my Tuesday session, ITDR offers a way of reimagining the scope and collaboration between the SOC and identity admins that can help stop more of these credential-based attacks. IAM requires a lot of the same telemetry and inventory that SOC teams have, but the two groups rarely share tools. That\u2019s because each team buys tools for different reasons. Operations and identity admins want stable, predictable operations and high uptime. Security analysts aren\u2019t concerned with uptime; they care about identifying threats. In other words, IAM is mostly focused on letting only the good guys in, but it also needs an equal capability for keeping the bad guys out.<\/p>\n<p>So, how do we reduce that staggering 65 percent of breaches that result from account-takeover attacks? And how do we know if and when the architecture itself is faulty? The solution lies in unifying more signals and more controls into a holistic solution. Microsoft is positioned to bridge the chasm between SOC and IAM because <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/azure-active-directory\">Microsoft Azure Active Directory<\/a> (Azure AD) is already the foundation identity that so many organizations rely on. In addition, <a href=\"https:\/\/docs.microsoft.com\/azure\/sentinel\/overview\">Microsoft Sentinel<\/a> provides a cloud-native SIEM and SOAR solution with built-in user entity and behavior analytics (UEBA), while <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-365-defender\">Microsoft Defender<\/a> provides XDR capabilities for user environments, and <a href=\"https:\/\/azure.microsoft.com\/services\/defender-for-cloud\/\">Microsoft Defender for Cloud<\/a> provides XDR for infrastructure and multicloud platforms.<\/p>\n<h2>Microsoft Entra: The way in is the way forward<\/h2>\n<p>Along with bridging the SOC and IAM relationship, Microsoft Entra is a vital component of Microsoft\u2019s approach to ITDR. The products in the Entra family help provide secure access by providing IAM, CIEM, and identity verification in one solution.<\/p>\n<p>Entra encompasses all of Microsoft\u2019s existing IAM capabilities and integrates two new product categories: <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-permissions-management\">Microsoft Entra Permissions Management<\/a> is a CIEM solution that empowers customers to discover, remediate, and monitor permission risks across all major public cloud platforms (such as Amazon Web Services, Azure, and Google Cloud Platform) from a unified interface. <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/microsoft-entra-verified-id\">Microsoft Entra Verified ID<\/a> provides a decentralized identity service based on open standards, safeguarding your organization by allowing admins to seamlessly customize and issue verifiable credentials in all your apps and services.&nbsp;<\/p>\n<p>Microsoft is working with our customers to reimagine IAM for our new decentralized workplace, and we\u2019re committed to providing end-to-end protection for your organization with <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-entra\">Microsoft Entra<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/business\/threat-protection\">SIEM and XDR<\/a>. We look forward to meeting with you at <strong><a href=\"https:\/\/www.gartner.com\/en\/conferences\/na\/identity-access-management-us\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner Identity &amp; Access Management Summit<\/a>, August 22 to 24, 2022, in Las Vegas, Nevada<\/strong>. Be sure to stop and chat with us at <strong>Microsoft Booth #304.<\/strong><\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\">\n<p><sup>1<\/sup><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener\">2022 Data Breach Investigations Report<\/a>, Verizon. 2022.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\">\n<p>GARTNER is a registered trademark and service mark of Gartner, Inc. and\/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The transition to a remote and hybrid workforce happened fast during a time of uncertainty, and IT professionals rose to the challenge with ingenuity and dedication. But two years in, many IT teams are still responding with patchwork solutions to enforce identity and access management (IAM) across a newly decentralized, multiple-endpoint ecosystem. It\u2019s clear that [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":127479,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[50,52],"class_list":["post-127478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-news","tag-recent-news","tag-security"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/127478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=127478"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/127478\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/127479"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=127478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=127478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=127478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}