Identity Under Siege: Modern ITDR from Microsoft
Microsoft Events brings together security leaders Eric Sachs and Raviv Tamir to discuss advanced identity protection using Microsoft Entra and Defender. The session emphasizes proactive security operations and modern ITDR strategies.
Identity Under Siege: Modern ITDR from Microsoft
Overview
This Microsoft Ignite 2025 breakout session explores modern approaches to protecting digital identities and enhancing security operations. Microsoft Entra and Defender leaders Eric Sachs and Raviv Tamir address real-world identity threats, collaboration across security teams, and actionable ways to strengthen identity threat detection and response (ITDR).
Key Topics Covered
- MFA Adoption and Challenges: Analysis of adoption trends, statistics, and barriers from the Microsoft Digital Defense report.
- Conditional Access and Zero Trust: Introduction to Microsoft Entra Conditional Access, supporting a Zero Trust security stance for enterprise applications.
- Unified Identity Fabric: Strategies for extending Microsoft Entra’s identity capabilities across cloud, hybrid, and enterprise environments.
- Threat Protection Automation: New methods to enhance visibility and automate responses to identity-based threats, streamlining team collaboration.
- Correlating User Identities: Techniques for associating users across multiple identity providers and platforms, enabling better risk assessment and incident response.
- Attack Techniques and Defenses: Discussion of how attackers move laterally between cloud, endpoint, and identity systems, and how unified Microsoft security solutions help mitigate these risks.
- Detailed Risk Analysis: Insights into risk detection, communication, and actionable remediations within Microsoft’s security ecosystem.
Resources
Conclusion
This session provides pragmatic guidance for IT and security professionals tasked with defending organizational identities. Attendees will develop a stronger understanding of Microsoft’s unified security platform, learn how to correlate signals across identity and threat landscapes, and implement proven practices for identity-centric threat defense.