Advanced Cyber Threats Demand a New Privileged Account Security Model

Multiple industry reports have established that privileged accounts have emerged as the primary target for advanced attacks. New research from ESG reports that many organizations continue to rely on marginal adjustments to privileged account security despite the increasing number of APTs linked to these accounts.According to ESG senior principal analyst Jon Oltsik, “tactical changes don’t go far enough. Rather, CISOs need to think in terms of a privileged account security architecture offering central control, management, monitoring, and oversight of privileged accounts.”In this webinar, Oltsik will elaborate on his findings, and his recommendation of CyberArk’s Privileged Identity Management Suite. CyberArk will share best practices for implementing effective privileged account security.
Watch Now

Spotlight

Extracting value from the computers or networks of unsuspecting companies and government agencies has become a big business. No company or agency can ignore network security; it is the source of systemic risk that threatens long-term health and profitability. Companies must secure their networks if they are to exercise fiduciary responsibility and due diligence. Cybersecurity is part of the larger corporate strategy for managing risk and compliance. Cybersecurity risk management is becoming a board-level responsibility. This paper identifies how those responsibilities can be met.


OTHER ON-DEMAND WEBINARS

Securing Wi-Fi Networks - A System Approach

"Wi-Fi security attacks, hacking, stolen mobile devices – are these keeping you awake at nights? Are you surprised that Wi-Fi networks can be more secure than your wired networks? Wireless LAN has come a long way from the days of its inception with inadequate security. Contrary to common belief, security is not a single protocol or an appliance or an encryption. It is a system of different components working together to ensure your Wi-Fi network is secure and your confidential information is protected. Join this webinar to learn about - Advances in Wi-Fi security - Multi-layers approach to holistic protection - Controlling user and device access - Controlling applications -Xirrus security solutions"

Cybersecurity Webinar: Breach investigation/response

Dentons attorneys will present this all new series addressing cybersecurity requirements for federal government contractors.This six-part series, useful to both large and small contractors alike and at both the prime and subcontract level, will provide important guidance for contractors who are seeking to ensure compliance with the government’s rapidly expanding cybersecurity requirements. Contractors will learn about the statutory and regulatory requirements applicable to contractors, including key agency-specific regulations;cyber requirements applicable to owners and operators of critical infrastructure, including the defense base; best practices for cyber breach investigation and response; and recent and future cyber developments, including the National Archives and Records Administration’s efforts to establish a government-wide system for identification and protection of controlled unclassified information. The series will be an invaluable resource for contractors who want to ensure compliance with existing cyber obligations while best positioning themselves competitively for future developments in the government contracts industry.

Critical Considerations for Securely Mobilizing Your Workforce–Any App, Anytime

Enabling your mobile workforce is not a one-time effort but a journey. Various mobility considerations will undoubtedly come into play requiring IT to make decisions around what enterprise mobile apps to roll out to various employees and with what kind of access policies. Do you need to deliver mobile device access to existing web applications? Do you need to develop new native mobile apps – for your employees or your customers? And then what’s the best way to manage and secure these mobile apps? Please join Arun Bhattacharya and Tyson Whitten from CA Technologies as they provide customer validated recipes for securely enabling your mobile workforce, while covering everyday use cases for mobile app development, management and security

Risk Mitigation or Risk Transference – Lessons from Physical Security

Every week we hear of new data breaches, estimates guess that only 10% of breaches make it to the public, so with so many breaches, where are security and risk professionals going wrong. This talk will take a look at the use of risk mitigation and risk transference in physical security and how these are strangely not replicated in logical / Information Security

Spotlight

Extracting value from the computers or networks of unsuspecting companies and government agencies has become a big business. No company or agency can ignore network security; it is the source of systemic risk that threatens long-term health and profitability. Companies must secure their networks if they are to exercise fiduciary responsibility and due diligence. Cybersecurity is part of the larger corporate strategy for managing risk and compliance. Cybersecurity risk management is becoming a board-level responsibility. This paper identifies how those responsibilities can be met.

resources