Leveraging Identity Data in Cyber Attack Detection and Response

As organizations break away from traditional network-based security concepts, where zones are delegated “trusted” or “untrusted,” to people-centric security models like Zero Trust, identity is becoming intrinsically linked to security. In fact, identity data can help security teams determine whether users or organizations are being subject to a cyber attack.

This whitepaper outlines what and how identity data can be used as an indicator of a cyber attack, as well as ways to respond to incidents using Identity and Access Management (IAM) systems.

Leveraging identity data in cyber attack detection and response.

Download the white paper

By submitting, I agree to the processing and international transfer of my personal data by Okta as described in the Privacy Policy.