One of the most popular catchphrases used in information security is "Trust, but verify." It's an oxymoron. If you can verify, you have no need to trust. If you do not verify, then trust is all you have - and it's blind.
Despite the bare simplicity of these facts, information security efforts lave long been handicapped by a disconnect between who the organization trusts and what is happening in the IT environment:
- Is malicious activity the action of a trusted individual? Or is it an attacker who has compromised a legitimate user's access credentials? How can you tell the difference - and how would knowing enable a more effective response?
- Is it OK to give trusted individuals access to sensitive resources regardless, no matter what the context - even if from, say, within the network of an adversary?
- Is the fact that a legitimate user account is being used for valuable transactions enough to determine whether or not fraud is being committed?
- How can you know when an individual - or a device - seeking access is not who (or what) they seem to be?
Join EMA Managing Research Director Scott Crawford and IBM Director of Identity & Access Management Ravi Srinivasan for a discussion of the ways that a more expansive concept of identity intelligence is transforming the nature of information security today - and how organizations that fail to recognize the criticality of identity intelligence to their security efforts are not only "flying blind," but are relying on trust alone.