Advanced Cyber Threats Demand a New Privileged Account Security Model

Multiple industry reports have established that privileged accounts have emerged as the primary target for advanced attacks. New research from ESG reports that many organizations continue to rely on marginal adjustments to privileged account security despite the increasing number of APTs linked to these accounts.According to ESG senior principal analyst Jon Oltsik, “tactical changes don’t go far enough. Rather, CISOs need to think in terms of a privileged account security architecture offering central control, management, monitoring, and oversight of privileged accounts.”In this webinar, Oltsik will elaborate on his findings, and his recommendation of CyberArk’s Privileged Identity Management Suite. CyberArk will share best practices for implementing effective privileged account security.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

The Pesky Password Problem: How Hackers and Defenders Battle for Your Network Control

KnowBe4

What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods? In this unique webinar you will learn about the recent NIST controversy and related password cracking problems. The “combatants” will be on the one side KnowBe4's Chief Hacking Officer, Kevin Mitnick with decades of first-hand “red-side” penetration testing experience, and on the other side Roger Grimes, KnowBe4's Data-Driven Defense Evangelist with decades of experience on the blue team.
Watch Now

ATT&CK Deep Dive: Lateral Movement

Carbon Black

Join Red Canary, Carbon Black, and MITRE ATT&CK™ for a deep dive into lateral movement detection. This hands-on webinar will demonstrate how applying lateral movement detection tactics and techniques can help you find higher level actors in your environment and improve the efficacy of your security program.
Watch Now

Enhancing Cyber Security in Public Sector through Artificial Intelligence (AI)

Protect data confidentiality, personally identifiable information (PII), intellectual property, and industry information systems from the risk of data breach, damage and theft.
Watch Now

Threat Hunting Reimagined

Devo

Threat hunting is a challenging, complex and time consuming exploratory activity. Threat hunters must explore, prioritize & investigate threats, gather data with context, connect disparate pieces of data, and conduct rapid and relevant analysis. Unfortunately today's tools get in the way and prevent the analyst from doing what they do best - hunt threats. Join our webinar and see firsthand how threat hunting teams can realize their full potential. With Devo, threat hunters can: Analyze real-time streaming and historical data at petabyte scale.
Watch Now