How to stop the Insider Threat: Protect yourself from Privileged Users
- LANGUAGE: English DATE: Tuesday, May 06, 2014 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors, the risk for your sensitive information is immense.
When looking to improve Information Security and mitigate risks, stopping the internal threat is your #1 task. The most important action herein is protecting yourself from the harm privileged users can cause.
In this KuppingerCole Webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will explain the changing threat landscape and focus on the specific role privileged users have therein.
In the second part, Jonathan Cogley and Ben Yoder of Thycotic Software will dive deeper into the details of insider threat: How to identify privileged accounts and bring them under control. Thycotic will explain how to efficiently reduce the attack surface in your organization and mitigate insider threats.
Platinum Sponsors
Speakers
Platinum Sponsor
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Our solutions put privileged access at the center of cybersecurity by defining the boundaries of access. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies. |

Downloads
Trending Videos
Next Webinar
Effective Threat Detection for Enterprises Using SAP Applications
Jun 28, 2022
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.