On-Demand Webinar / Active Directory

Strengthening Identity Security Posture Management (ISPM)

Visibility for your organization to manage misconfigurations, vulnerabilities, and risk exposure

On-Demand

Stop Identity-Based Attacks Before They Start.

Join us to explore how top security teams use Identity Security Posture Management (ISPM) to continuously assess risky identities, close privilege gaps, and harden their environments before attackers exploit them.

Highlights of session:

  • Cut attack paths with Just-in-Time access to reduce privileged account risk
  • Detect zero-day threats like BadSuccessor quickly & how Tenable spots identity-based threats before they spread
  • Identity Threat Command Centre - track top identity risks and see where threats keep coming back
  • Actionable insights in 5 minutes - quick wins with deep insights, shareable reports, and clear next steps to reduce risk fast

Who should watch?
Whether you’re a CISO, IAM lead, or cloud security architect, this session will give you the insights you need to proactively strengthen your identity layer and reduce attack surface.


발표자

Photo of Ben Mudie, Principal Security Engineer, Tenable
Ben Mudie

Field CTO APJ, Tenable

Kenneth Teo
Kenneth Teo

Principal Security Engineer, Tenable

Wing Churn Leong
Wing Churn Leong

Senior Cloud Security Engineer, APJ, Tenable

리소스

Analyst Research
可視化× 自動化×統合化によるクラウドセキュリティのアプローチ
솔루션
Tenable One Cloud Exposure를 활용한 포괄적인 조기 개입(shift-left) 보안
사이버 위험 노출 리서치
2026년 클라우드 및 AI 보안 위험 보고서