Woman smiling

7 Takeaways About Identity Security From Proofpoint Protect 2024

Share with your network!

We just completed four Proofpoint Protect 2024 conferences. If you’re unfamiliar with Protect, it’s an annual security conference that brings together Proofpoint customers, prospects, partners and many dozens of our staff in cities around the United States and London. At all four conferences, I had the opportunity to co-present multiple sessions about the need for improved identity security and how the Proofpoint Identity Protection solution can help. 

But I didn’t just share what I know. I also learned more than a few things about identity threat detection and response (ITDR) from the approximately 500 session attendees and my 11 co-presenters in my seven breakout sessions. I was fortunate enough to co-present with security professionals from CyberArk, Toromont CAT, TurkCell, Tetra Pak and Darling Ingredients, as well as members from our own Proofpoint security team.  

7 Takeaways from Protect 2024 

There were so many valuable takeaways. I want to share some of what I learned here. 

1: There’s intense interest in ITDR 

Clearly, there is intense and growing interest in improving identity security in general and identity threat detection and response (ITDR) solutions in particular. While most of the attendees didn’t have much direct experience with ITDR, the drive to learn drove intense interest in our ITDR-centric breakout sessions. Which is why we delivered sessions on the topic seven times across the four Protect conferences. 

2: The middle of the attack chain is often new territory 

Related to the topic of identity security is the middle of the attack chain, which is where persistence, information gathering, privilege escalation and lateral movement occur. Unfortunately, it’s this middle part where many organizations have major gaps in their existing security defenses. Initially, this part of security seemed foggy in the minds of many attendees of our sessions. But I think the sessions provided some important clarity for why it’s so critical.  

I find that using the attack chain as a framework is an excellent way to explain the purpose of ITDR solutions like our Identity Threat Defense product. With this framework, it’s easier for defenders to consider the exact steps that an attacker must take and how they can better defend against them. 

 Cyberattack chain

Steps in the attack chain. 

3: Deceptions are a game-changer 

Audiences were really captivated by our discussion of the use of deceptions for detection and response. The idea of deceptions challenged them to think differently about how to best detect and respond to active threats. For many years now, organizations have been trying to detect active threats using signatures and behavior-based detective approaches. These methods have had varied success at the expense of significant time and money. The challenge of minimizing both false positives and false negatives has proved daunting for many organizations.  

Deceptions turn detective analytics on its head. Instead of hunting for threat actors by using massive amounts of data and applying highly tuned detective analytics, deceptions enable an organization to know when a threat actor is present and is attempting to move around the organization (in the middle of the attack chain). While deceptions have not gained broad mainstream adoption yet, the audiences in our Protect breakout sessions left with a new way to think about detection and response. 

4: AD hygiene is increasingly important 

Non-spoiler alert: Active Directory (AD) is a security mess at every organization that uses it. The reasons for this are largely the same everywhere. For starters, many hands administer it over many years, and most organizations lack comprehensive AD governance. And the list goes on—from short-term and quick fixes to one-off projects to mergers and acquisitions. Those are just the more common contributors. Ironically, the result of all this is that AD can now reasonably be seen as a key tool for attackers.  

Given all the attacker tools that are available to automatically take advantage of AD’s misconfigurations and exposures, is it any wonder that interest in ITDR is rising? This interest is driven, in part, by the need for improved AD hygiene. You can read more about the challenges of AD hygiene in this newly published report

5: MFA isn’t enough 

Account takeovers of SaaS-based identity providers—such as Microsoft Entra ID, Okta and Google—are increasingly recognized as a key security challenge as well as a primary source of initial compromise. For attackers to reach the middle of the attack chain, they must successfully make some kind of initial compromise. Many in the audience were surprised to learn that most account takeovers detected by Proofpoint have multifactor authentication (MFA) in place. The key takeaway is that MFA is good. But, given the current tools and techniques used by attackers, it’s not good enough. Today, identity-centric defense-in-depth is required. 

6: There are often barriers to adding more security 

Another non-spoiler alert: Many organizations are challenged to acquire and deploy new security controls of any type. This includes ITDR. Every organization has limits, including staff and budgets. That’s nothing new. But a topic that came up multiple times is how the deployment of ITDR challenges the way that security organizations themselves are structured and how identity security is managed.   

A common debate was about which team should own the problem—and thus the solution—to the identity security problem. Is it the SOC team, or IT operations, or the identity management team, or the vulnerability management team? The stark reality is that one of the key contributors to major breaches are these gaps in organizational problem ownership. It’s in these gaps that there’s a lack of identity security controls—and where threat actors consistently slip through. Organizations that have leading security operations have figured out how to organize and apply ITDR solutions to this problem. Now we must bring the rest along with us. 

7: There are multiple drivers to ITDR  

What drives organizations to invest in ITDR? For most, it seems to come down to various outside forces. It might be the results from red team exercises or penetration tests. Or it could be documented weaknesses in an audit, or a security incident, or a breach at the organization or at one of its industry peers. It might even be a CISO who has a vision and a drive to innovate. All these factors serve to drive organizations out of their comfort zones and embrace improved identity security and ITDR. 

Conclusion 

Clearly, the need for improved identity security is a growing concern among a broad swath of security professionals. My experiences at Protect 2024 are but one viewpoint. But as has been said in other contexts that the first step to solving a problem is recognizing you have one. Given that, I think the security industry is well on its way to solving this one. 

If you want to continue this discussion, please join Carlos Rivera of Info-Tech Research Group and me in the upcoming webinar: “Securing Identities: The Critical Role of Identity Threat Detection & Response.”