When organizations are moving to use cloud services, more and more business-critical information resides outside organization premises. This information cannot be protected with traditional security measures, such as firewalls and network segmentation. Instead, access to information is based solely on identity.
Indeed, identity has become the new security perimeter that should be protected by any means available. Conditional Access (CA) is a powerful tool to allow or deny access to Azure AD and, consequently, an organization's information. The most critical decision criteria for CA are user and device identities. But what does "identity" mean in Azure AD? How secure are they? Can they be forged or stolen? How to protect them?
In this session, I'll explain the details of both user and device identities and how they together help to protect organizations' information. I'll also show how identities can be forged and stolen, but also how to protect them to keep your organization safe!
You will learn:
- Understand the user and device identities in Azure AD
- Understand the weak points of identities and how to compromise them
- Learn the best practices to protect your Azure AD identities