
Non-Human Identity The Risks, The Reality, And How To Manage
Online Event: CISOs Talk Non-Human Identity and why management is critical in today's digital world.
TAMPA, FL, UNITED STATES, August 28, 2024 /EINPresswire / -- The protection of non-human identities (NHIs) has emerged as a critical concern for organizations worldwide. To address these growing challenges, leading cybersecurity experts will come together for the online event "Non-Human Identity: The Risks, The Reality, and How to Manage ," scheduled for September 24, 2024, at 2:00 PM ET.This event, structured into three focused 20-minute sessions, is designed to provide attendees with actionable insights and strategies for securing non-human identities-an area often overlooked in traditional Identity and Access Management (IAM) solutions. Unlike human accounts, non-human accounts often go undetected when compromised, giving malicious actors prolonged access to critical systems and data. This event aims to equip security professionals with the tools and knowledge they need to safeguard these essential digital identities.
Session Overview:
Session 1: From PAM to NHI Management – Navigating the Challenges of Securing Machine-to-Machine Access
Time: 2:00 PM ET
Speakers:
Ryan Frillman, CISO, Equifax Workforce Solutions
Dorene Rettas, Co-Founder, Cyber Security Tribe
This session will explore the unique security risks posed by the rapid adoption of cloud service providers (CSPs) and SaaS products for identity creation. With API-centric services becoming increasingly accessible, the session will raise critical questions about credential oversight and the dangers of embedding keys within codebases. Attendees will gain insights into managing trust in automation, particularly when human operators are unaware of the credentials in use.
Session 2: Best Practices to Secure NHIs
Time: 2:30 PM ET
Speakers:
Bezawit Sumner, CISO, CRISP
Roey Rozi, Director of Solution Architecture, Oasis Security
This session will focus on the best practices for securing non-human identities, addressing challenges related to visibility, ownership, posture, and compliance. The speakers will share strategies for automating secret rotation, policy enforcement, and more, offering practical solutions to bolster security in an increasingly complex threat landscape.
Session 3: Case Study – How Antares Financial Solved Security Challenges Leveraging NHIM
Time: 3:00 PM ET
Speakers:
Antares Financial Cybersecurity Team
In the final session, cybersecurity experts from Antares Financial will present a real-world case study on overcoming security challenges in a rapidly growing cloud environment. The session will detail how Antares Financial implemented an NHI Management platform, focusing on lifecycle automation to reduce breach risks and improve operational efficiency. Attendees will walk away with actionable insights to apply within their own organizations.
Why Attend?
Gain expert insights into managing and securing non-human identities.
Learn from real-world case studies and best practices.
Equip your organization with strategies to mitigate the risks associated with NHI exploitation.
Don't miss this opportunity to stay ahead in the ever-changing cybersecurity landscape. Register now to secure your spot for this essential event.
For more information and to register, visit
Dorene Rettas
Cyber Security Tribe
+1 9737131097
email us here
Legal Disclaimer:
EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.

Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.
Comments
No comment