Intelligent Tech Channels LATAM Issue 11 | Page 27

FUTURE TECHNOLOGY protecting credentials , privileges , rights , and the systems and policies that manage them . The search for alignment with the ITDR discipline depends on some steps having been fulfilllled before making the leap towards best practices in ITDR .
In the identity threat detection arm of ITDR , Identity Access Management ( IAM ) policies and procedures are critical . It is the IAM platform that will require , for example , MFA , PAM and profile-based access controls to release access .
Stepping into ITDR can leverage IAM intelligence by detecting misconfigurations or overly broad permissions in AD accounts , making IAM enforcement more effective .
ITDR also helps organizations review and update firewalls , intrusion detection and prevention systems , and other devices . ITDR can also increase the accuracy of antiphishing , anti-virus , anti-malware and other security applications .
Another gain brought by ITDR is the continuous monitoring of threats for suspicious activity on user accounts . Those who already have a SIEM ( Security
Information Event and Management ) will see this platform add suspicious action alerts to the ITDR that , with the help of this new platform , will be inserted in a 360 o view that goes far beyond the original SIEM environment .
From there , ITDR can trigger a process to automatically and temporarily revoke credentials until a human studies the alert . In the ‘ response ’ arm to attempted identity breaches , the ITDR also shows its strength . Organizations that seek to align
ITDR works by implementing detection mechanisms , investigating posture changes and suspicious activity . with this discipline and rely on intelligence to map threats and automate responses can easily put into action a new incident response plan focused on tackling criminal activities such as ATO ( Account Takeover ).
The vision brought by ITDR helps the incident response plan automate actions to deal with stolen credentials , account takeover and privilege escalation .
People and processes
As with everything related to cybersecurity , however , it is essential to invest in processes and people for ITDR to show its full strength . It is necessary to reinvent processes and build knowledge bases that glue digital security policies to the support of the business . And , finally , to carry out training and awareness actions for employees so that the protection of identity begins with the person himself .
In 2024 , user identity is one of the most valuable digital assets for businesses , and for cybercriminals . Advancing the protection of this treasure is critical to sustaining Brazil ’ s digital economy . •
INTELLIGENT TECH CHANNELS LATAM 27