{"id":17442,"date":"2026-02-26T09:48:39","date_gmt":"2026-02-26T14:48:39","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?post_type=tribe_events&#038;p=17442"},"modified":"2026-02-26T09:48:39","modified_gmt":"2026-02-26T14:48:39","slug":"2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next","status":"publish","type":"tribe_events","link":"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/","title":{"rendered":"2026 SANS State of Identity Threats &amp; Defenses Survey Insights Event: How Identity Became the New Security Perimeter\u2014And What\u2019s Next"},"content":{"rendered":"<p>Identity has become the new battleground. From SaaS to cloud to legacy Active Directory, it is now the central control point\u2014and attackers know it. Credential theft, token hijacking, and consent abuse are on the rise, and defenders must adapt quickly. The 2026 SANS Identity Threat &amp; Defenses Survey delivers benchmarks and real-world data to help you strengthen your defenses. Join this exclusive webcast to explore findings that matter for both security leaders and hands-on practitioners.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity has become the new battleground. From SaaS to cloud to legacy Active Directory, it is now the central control point\u2014and attackers know it. Credential theft, token hijacking, and consent [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[],"class_list":["post-17442","tribe_events","type-tribe_events","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2026 SANS State of Identity Threats &amp; Defenses Survey Insights Event: How Identity Became the New Security Perimeter\u2014And What\u2019s Next - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2026 SANS State of Identity Threats &amp; Defenses Survey Insights Event: How Identity Became the New Security Perimeter\u2014And What\u2019s Next - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"Identity has become the new battleground. From SaaS to cloud to legacy Active Directory, it is now the central control point\u2014and attackers know it. Credential theft, token hijacking, and consent [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/\",\"name\":\"2026 SANS State of Identity Threats &amp; Defenses Survey Insights Event: How Identity Became the New Security Perimeter\u2014And What\u2019s Next - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"datePublished\":\"2026-02-26T14:48:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/ndisac.org\/dibscc\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2026 SANS State of Identity Threats &amp; Defenses Survey Insights Event: How Identity Became the New Security Perimeter\u2014And What\u2019s Next\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2026 SANS State of Identity Threats &amp; Defenses Survey Insights Event: How Identity Became the New Security Perimeter\u2014And What\u2019s Next - DIB SCC CyberAssist","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"2026 SANS State of Identity Threats &amp; Defenses Survey Insights Event: How Identity Became the New Security Perimeter\u2014And What\u2019s Next - DIB SCC CyberAssist","og_description":"Identity has become the new battleground. From SaaS to cloud to legacy Active Directory, it is now the central control point\u2014and attackers know it. Credential theft, token hijacking, and consent [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/","og_site_name":"DIB SCC CyberAssist","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/","url":"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/","name":"2026 SANS State of Identity Threats &amp; Defenses Survey Insights Event: How Identity Became the New Security Perimeter\u2014And What\u2019s Next - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"datePublished":"2026-02-26T14:48:39+00:00","breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/events\/2026-sans-state-of-identity-threats-defenses-survey-insights-event-how-identity-became-the-new-security-perimeter-and-whats-next\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/ndisac.org\/dibscc\/events\/"},{"@type":"ListItem","position":3,"name":"2026 SANS State of Identity Threats &amp; Defenses Survey Insights Event: How Identity Became the New Security Perimeter\u2014And What\u2019s Next"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/17442"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=17442"}],"version-history":[{"count":1,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/17442\/revisions"}],"predecessor-version":[{"id":17443,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/17442\/revisions\/17443"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=17442"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=17442"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events_cat?post=17442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}