Defending infrastructure from identity provider compromise
This session explores how to build defense-in-depth for your infrastructure using Teleport, ensuring secure access and minimizing risk, even in the event of identity provider compromise.
Single sign-on providers are frequent targets for attackers, and recent breaches have made one thing clear: no identity provider is immune. In this session, Jovin demonstrates how to protect infrastructure when your IdP is compromised.
Drawing on real-world examples, the talk explores how Teleport strengthens access security through per-session MFA, device trust, and ephemeral credentials. Attendees will learn how to adopt a defense-in-depth approach that limits blast radius, supports compliance, and assumes breach as a baseline. Whether building zero-trust systems or securing sensitive infrastructure, this session provides practical strategies to reduce exposure, even when the identity provider fails.
Drawing on real-world examples, the talk explores how Teleport strengthens access security through per-session MFA, device trust, and ephemeral credentials. Attendees will learn how to adopt a defense-in-depth approach that limits blast radius, supports compliance, and assumes breach as a baseline. Whether building zero-trust systems or securing sensitive infrastructure, this session provides practical strategies to reduce exposure, even when the identity provider fails.
Defending infrastructure from identity provider compromise
This session explores how to build defense-in-depth for your infrastructure using Teleport, ensuring secure access and minimizing risk, even in the event of identity provider compromise.
Panelist

Panelist

Panelist

Moderator

Diana Jovin
CMO, Teleport
Single sign-on providers are frequent targets for attackers, and recent breaches have made one thing clear: no identity provider is immune. In this session, Jovin demonstrates how to protect infrastructure when your IdP is compromised.
Drawing on real-world examples, the talk explores how Teleport strengthens access security through per-session MFA, device trust, and ephemeral credentials. Attendees will learn how to adopt a defense-in-depth approach that limits blast radius, supports compliance, and assumes breach as a baseline. Whether building zero-trust systems or securing sensitive infrastructure, this session provides practical strategies to reduce exposure, even when the identity provider fails.
Drawing on real-world examples, the talk explores how Teleport strengthens access security through per-session MFA, device trust, and ephemeral credentials. Attendees will learn how to adopt a defense-in-depth approach that limits blast radius, supports compliance, and assumes breach as a baseline. Whether building zero-trust systems or securing sensitive infrastructure, this session provides practical strategies to reduce exposure, even when the identity provider fails.
Defending infrastructure from identity provider compromise
This session explores how to build defense-in-depth for your infrastructure using Teleport, ensuring secure access and minimizing risk, even in the event of identity provider compromise.
Single sign-on providers are frequent targets for attackers, and recent breaches have made one thing clear: no identity provider is immune. In this session, Jovin demonstrates how to protect infrastructure when your IdP is compromised.
Drawing on real-world examples, the talk explores how Teleport strengthens access security through per-session MFA, device trust, and ephemeral credentials. Attendees will learn how to adopt a defense-in-depth approach that limits blast radius, supports compliance, and assumes breach as a baseline. Whether building zero-trust systems or securing sensitive infrastructure, this session provides practical strategies to reduce exposure, even when the identity provider fails.
Drawing on real-world examples, the talk explores how Teleport strengthens access security through per-session MFA, device trust, and ephemeral credentials. Attendees will learn how to adopt a defense-in-depth approach that limits blast radius, supports compliance, and assumes breach as a baseline. Whether building zero-trust systems or securing sensitive infrastructure, this session provides practical strategies to reduce exposure, even when the identity provider fails.
Defending infrastructure from identity provider compromise
This session explores how to build defense-in-depth for your infrastructure using Teleport, ensuring secure access and minimizing risk, even in the event of identity provider compromise.
Panelist

Panelist

Panelist

Host

Diana Jovin
CMO, Teleport
Sign up now

