‘Data violators’ have outpaced data defenders. But security and identity analytics can level the playing field. Learn how identity, access and security disciplines can benefit from: Risk-based authentication Data exfiltration identification Malicious insider activity disruption Adaptive access certification Presenter: Adam Evans, Solutions Consulting