Mitigate targeted attacks with privileged account analytics

  • LANGUAGE: English DATE: Monday, March 24, 2014 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
Upcoming Webinars

Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can increase detection rates, cost less and be easier to operate. Learn how advanced and insider attacks maneuver throughout your organization, and where and how to intercept them with targeted privileged account analytics.

In this webinar, Martin Kuppinger of KuppingerCole will look at the broader context of cyber-attacks, the structure of some of the known attack scenarios that have been identified, and ways to improve your cyber-attack resilience. Given that privileged accounts due to their highly elevated nature are a logical element in such attacks, monitoring these is an important element in security strategies. He will put such analytics in the overall context of Realtime Security Analytics and cyber-attack resilience.

In the second part of the webinar, Jochen Koehler of CyberArk will dive into detail on attack scenarios and how to intercept them with targeted privileged account analytics.


Platinum Sponsors

Speakers

Jochen Koehler is the Regional Director for the DACH region at CyberArk. Jochen brings with him over 13 years of experience within the IT industry with a proven track record of successful go-to-market strategies for innovative IT solutions, especially in Identity Management and the IT security...


Platinum Sponsor

CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn, XING or Facebook. 

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Finding Your Path to Zero Trust

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00