© Morey J. Haber, Darran Rolls 2020
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_18

18. Identity-Based Threat Response

Morey J. Haber1  and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

No one wants to respond to a security incident or a breach. There is never a good time for a breach. Instead, the highest priority should always be to stop a cyberthreat before it compromises the organization.

In reality, preventing a cyberattack from happening in the first place is not always possible. In fact, almost every organization suffers from security incidents on a fairly regular basis these days. The steps for an incident or breach identification, from threat hunting to searching for explicit IoC, are well established. ...

Get Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.