Wayne Hilt, Executive Director, Office of the CISO, Optiv
Stephen Lee, Senior Director, Business Development & Partner Solutions, Okta
Breaches happen because most organizations treat identity management as a “necessary evil” rather than a fundamental, core enabler of an effective security program. Today, security organizations spend the majority of their time and energy preventing, detecting, and responding to intrusions. No matter how the intrusion begins, identity compromise and privilege escalation is a key factor. What if you could reduce the time to detect and mitigate intrusions through intelligent correlation and an integrated control framework? In this session, former CISO and Optiv Executive Director Wayne Hilt explains why an identity-centric approach to security should be top of mind for all CISOs and security organizations, and see it in action with Okta’s Stephen Lee and Optiv technology partners CyberArk, LogRhythm, and Netskope.
Learn More: Identity + Security: Past, Present and Future