Skip to content
ConRes-Cisco-Logo-Lockup-LP

You can't defend what you can't see
A strategic series for security leaders

Embracing multiple IDPs and signal sharing framework 

What's inside
 Identity needs continuous, real-time risk exchange—not one-time authentication. Bill explores SSF, adaptive access and change-of-authorization (COA) concepts that bring “live” risk to cloud apps and IDPs. 

Identity is the new perimeter

What's inside
Bill Steele (ConRes) and Aaron Woland (Cisco) unpack the future of ITDR, zero trust and the impact of agentic AI. Why identity is now the frontline of cybersecurity, the shift from perimeter-based security to identity-first models, how AI and cloud IDPs are transforming threat detection, and actionable insights for CISOs and security directors.
ConRes-BillSteele-LP-HeaderImage-v2

Why watch the series?

Bill Steele (ConRes) and Aaron Woland (Cisco) unpack where identity security is headed—Identity Threat Detection and Response (ITDR), zero trust and the operational impact of agentic AI.

Identity is now the frontline of cybersecurity—and attackers know it. This series reveals how to spot early compromise signals, close visibility gaps across identity providers (IDP) and operationalize zero trust with real-time identity intelligence:

  • Why identity is now the frontline of cybersecurity
  • How attacker tactics are shifting­­—and what signals to watch
  • The critical role of phishing-resistant multi-factor authentication (MFA) and passkeys
  • Why ITDR is essential
  • How multi-IDP visibility and shared signals close zero-trust gaps

Why watch the series?

Bill Steele (ConRes) and Aaron Woland (Cisco) unpack where identity security is headed—Identity Threat Detection and Response (ITDR), zero trust and the operational impact of agentic AI.

Identity is now the frontline of cybersecurity—and attackers know it. This series reveals how to spot early compromise signals, close visibility gaps across identity providers (IDP) and operationalize zero trust with real-time identity intelligence:

  • Why identity is now the frontline of cybersecurity
  • How attacker tactics are shifting­­—and what signals to watch
  • The critical role of phishing-resistant multi-factor authentication (MFA) and passkeys
  • Why ITDR is essential
  • How multi-IDP visibility and shared signals close zero-trust gaps
ConRes-BillSteele-LP-HeaderImage-v2

Recognizing privilege escalation anomalies to thwart identity attacks

Privilege-escalation attempts are early indicators of compromise. Bill covers non-human identities, MFA fatigue attacks, and the hidden cost of credential storms.

Identity is the new perimeter

Bill Steele (ConRes) and Aaron Woland (Cisco) unpack the future of ITDR, zero trust and the impact of agentic AI. Why identity is now the frontline of cybersecurity, the shift from perimeter-based security to identity-first models, how AI and cloud IDPs are transforming threat detection, and actionable insights for CISOs and security directors.

 

How single vendor IDP strategies are leaving gaps

Most enterprises run multiple IDPs. Native tools tend to see only their own lane—creating blind spots. Bill shows how third-party ITDR correlates first-factor logs, MFA prompts and risk events across providers to surface misconfigurations and anomalous access.

Recognizing privilege escalation anomalies to thwart identity attacks

Privilege-escalation attempts are early indicators of compromise. Bill covers non-human identities, MFA fatigue attacks, and the hidden cost of credential storms.

How single vendor IDP strategies are leaving gaps

Most enterprises run multiple IDPs. Native tools tend to see only their own lane—creating blind spots. Bill shows how third-party ITDR correlates first-factor logs, MFA prompts and risk events across providers to surface misconfigurations and anomalous access.

Embracing multiple IDPs and signal sharing framework

Identity needs continuous, real-time risk exchange—not one-time authentication. Bill explores SSF, adaptive access and change-of-authorization (COA) concepts that bring “live” risk to cloud apps and IDPs.

Cisco secure access and how zero trust is evolving

Zero trust is moving from network-centric to identity-first. Bill shows how Cisco Secure Access blends per-app policies, device trust and continuous authorization—plus when to use ZTNA clients vs. cloud proxy for scale.

How to gauge identity security readiness

Visibility first. Bill outlines a low-lift assessment that integrates your identity logs into Cisco Identity Intelligence for two weeks—surfacing missing MFA, stale accounts, unused apps and high-risk patterns.

Six keys to better identity security

Practical, modern controls that raise security without adding friction—passkeys + MFA, shorter cookie lifetimes, transparent re-auth, device-rooted credentials, per-app assertions and Duo/Duo Passport alignment.

Interested in learning what security leaders must do to stay ahead? 

Schedule a 30-minute call with a ConRes Security expert to get started.