IAM Premier Consultant IBM Canada Sherbrooke, Quebec, Canada
In the future, attackers will probably leverage AI and machine learning to tailor attacks to the context or to a target. They will be able to get around the new breed of AI-enhanced tools, such as antivirus or email filtering. It’s just a matter of time for threat actors to leverage AI to get around even the newest PAM tools. There is always the need to have privileged access at some point, even if it’s indirect in nature.
The next generation of PAM architecture must respond to this. Ways to do this include AI and active response. Active response can leverage SOAR to respond to incidents and suspend accounts, disconnect sessions or block access. This is all part of a more advanced zero trust approach
Learning Objectives:
Gain a better understanding of advanced zero trust architecture linked to IAM.
Be able to integrate advanced concepts in their security architecture.
Be able to define a roadmap and strategy for their IAM security architecture.