Security Office Hours Recording: Conditional Access - Granular control of logins
Let's Connect!
Got questions or want to continue the conversation? Fill out the form below and we will get in touch!
Recording Overview
In this essential webinar, explore the vital topic of Conditional Access in cybersecurity. Learn how to implement control over login processes, a critical aspect for securing digital assets in today's technology-driven world.
Meeting highlights:
Embark on a journey through the latest trends and real-world cases in cybersecurity, offering a comprehensive understanding of Conditional Access and its role in modern digital security. Our discussion will include:
- Analyzing Cybersecurity Trends: Focusing on the Okta Breach, we'll discuss critical issues like Corporate Password Sync, Personal Account Compromise, and the importance of Password Managers.
- Case Study – Teams Attack: A real-world example involving a Teams attack on an Endsight client, highlighting the role of Cloud SOC in combating such threats.
- Exploring Conditional Access: Diving into scenarios where access is controlled based on specific hardware, user groups, or software conditions, and discussing common policies like geofencing for logins, Multifactor Authentication, and preventing legacy logins.
- Advanced Control and Compliance: We'll explore the extensive control features of Conditional Access, including setting exceptions and its role in compliance and documentation, along with discussing the strategic differences between "Opt Out" and "Opt In" configurations.
- Interactive Discussion with Endsight Team: Concluding with an open discussion about cloud SOC solutions, providing attendees an opportunity for deeper insights and practical advice.
Get the slide deck:
Resources mentioned in training:
Presenters
Jason Clause
Sr. IT Executive @ Endsight
Jason has spent the last 18 years working in the managed IT services industry. He has been presenting cybersecurity events for the past several years. He has a bachelor’s degree in Public Relations from Kent State University and is a Microsoft Certified Professional. Jason is certified by Sophos, a worldwide leader in next-generation cybersecurity.
Stephen Hicks
Security Practice Manager @ Endsight
Stephen has spent his entire professional career in the technology industry. He holds an MBA from Saint Mary's College and just over a dozen technical certifications including advanced cybersecurity certifications CISSP and CISM. He has a second-degree black belt in Shito Ryu Karate and loves to scuba and ski.