As Principal Threat Intelligence Lead with a focus on ransomware at the Microsoft Threat Intelligence Center (MSTIC), Christopher Glyer is part of the team that investigates how the most advanced threat actors access and exploit systems. For the inaugural edition of Cyber Signals, he shares his thoughts on identity and security.
The shift to the cloud makes identity one of the core components organizations must prioritize when implementing proactive security protections. Identity is also an early focus area in any security investigation related to possible intrusions.
“When an attacker gains access to someone’s identity and then reuses that identity to access applications and data, organizations need to understand exactly how that identity was accessed, what applications were touched, and what was done within those applications,” Glyer explains. “From a protection perspective, the number one thing you must do is prevent an identity from being stolen, abused, or misused. Preventing this from happening in the first place is critical.”
Follow Microsoft Security