公式動画ピックアップ
AAPL
ADBE
ADSK
AIG
AMGN
AMZN
BABA
BAC
BL
BOX
C
CHGG
CLDR
COKE
COUP
CRM
CROX
DDOG
DELL
DIS
DOCU
DOMO
ESTC
F
FIVN
GILD
GRUB
GS
GSK
H
HD
HON
HPE
HSBC
IBM
INST
INTC
INTU
IRBT
JCOM
JNJ
JPM
LLY
LMT
M
MA
MCD
MDB
MGM
MMM
MSFT
MSI
NCR
NEM
NEWR
NFLX
NKE
NOW
NTNX
NVDA
NYT
OKTA
ORCL
PD
PG
PLAN
PS
RHT
RNG
SAP
SBUX
SHOP
SMAR
SPLK
SQ
TDOC
TEAM
TSLA
TWOU
TWTR
TXN
UA
UAL
UL
UTX
V
VEEV
VZ
WDAY
WFC
WK
WMT
WORK
YELP
ZEN
ZM
ZS
ZUO
公式動画&関連する動画 [Perimeters Are So 2015: Expanding Risk Operations with Identity Context | ROCon 2025]
Firewalls stop packets, not privilege abuse.
In this ROCon 2025 session, Himanshu Kathpal, VP of Product Management at Qualys, and Corey Amsler, Director of Risk Management at GE Vernova, reveal why identity — not the perimeter — is the new frontier of cyber risk.
As attackers increasingly exploit Active Directory, Entra ID, and hybrid identity systems to gain unauthorized access, traditional defenses fall short.
This session reframes identity posture as the new attack surface and shows how the Risk Operations Center (ROC) model expands to include identity-based telemetry.
You’ll learn how to:
•Correlate identity data with risk context across cloud, hybrid, and on-prem environments
•Map identity weaknesses to real-world threats and lateral movement
•Detect privilege creep, misconfigurations, and account abuse with continuous visibility
•Strengthen compliance and least-privilege enforcement
•Integrate identity risk into Enterprise TruRisk Management (ETM) for a unified security view
Himanshu and Corey also discuss the launch of Qualys Identity Risk Management (IRM) — a modern approach to visualizing, prioritizing, and mitigating identity risks across complex environments.
Recorded live at ROCon 2025 – The Risk Operations Conference, presented by Qualys.
158
6