
Sign up to save your podcasts
Or


Summary
This episode explores the critical importance of Identity Threat Detection and Response (ITDR) in modern cybersecurity. Hosted by Santosh, it covers how identity infrastructure is the most targeted layer in enterprises, the rise of identity-based attacks, and practical strategies to enhance security posture.
Key Topics
The rise of identity-based attacks and their impact
The three pillars of ITDR: visibility, detection, response
Real-world examples: SolarWinds, MGM, Striker attack
How AI is transforming cyber threats and defenses
Practical steps to assess and improve your identity security
Chapters
00:00 The Reality of Data Breaches
02:29 Understanding Identity Threat Detection and Response (ITDR)
06:58 The Urgency of ITDR in Today's Landscape
10:33 Case Study: Learning from the Striker Attack
13:18 Key Takeaways for Organizations
16:09 Identity as the New Perimeter
Keywords
cybersecurity, ITDR, identity security, data breaches, identity attacks, zero trust, cloud security, breach prevention, cybersecurity strategy
Let’s Stay Connected
📧 Email: [email protected]
🔗 LinkedIn: linkedin.com/in/kssantosh
By Santosh SubramanianSummary
This episode explores the critical importance of Identity Threat Detection and Response (ITDR) in modern cybersecurity. Hosted by Santosh, it covers how identity infrastructure is the most targeted layer in enterprises, the rise of identity-based attacks, and practical strategies to enhance security posture.
Key Topics
The rise of identity-based attacks and their impact
The three pillars of ITDR: visibility, detection, response
Real-world examples: SolarWinds, MGM, Striker attack
How AI is transforming cyber threats and defenses
Practical steps to assess and improve your identity security
Chapters
00:00 The Reality of Data Breaches
02:29 Understanding Identity Threat Detection and Response (ITDR)
06:58 The Urgency of ITDR in Today's Landscape
10:33 Case Study: Learning from the Striker Attack
13:18 Key Takeaways for Organizations
16:09 Identity as the New Perimeter
Keywords
cybersecurity, ITDR, identity security, data breaches, identity attacks, zero trust, cloud security, breach prevention, cybersecurity strategy
Let’s Stay Connected
📧 Email: [email protected]
🔗 LinkedIn: linkedin.com/in/kssantosh