How to stop the Insider Threat: Protect yourself from Privileged Users

  • LANGUAGE: English DATE: Tuesday, May 06, 2014 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Upcoming Webinars

The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors, the risk for your sensitive information is immense.

When looking to improve Information Security and mitigate risks, stopping the internal threat is your #1 task. The most important action herein is protecting yourself from the harm privileged users can cause.

In this KuppingerCole Webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will explain the changing threat landscape and focus on the specific role privileged users have therein.

In the second part, Jonathan Cogley and Ben Yoder of Thycotic Software will dive deeper into the details of insider threat: How to identify privileged accounts and bring them under control. Thycotic will explain how to efficiently reduce the attack surface in your organization and mitigate insider threats.


Platinum Sponsors

Speakers

Jonathan grew up in South Africa and began his software engineering career in London where he founded Thycotic Software Ltd in 1996, moving Thycotic headquarters to the United States several years later. Thycotic is recognized as the fastest growing private company in identity and access...

Ben Yoder is a software engineer turned product manager and a lover of all things IT. He’s an expert on technology integrations and database systems, manages Thycotic Software’s market-leading Privileged Account Management solution, and keeps a keen eye on product trends in the IT...


Platinum Sponsor

The easiest to manage and most readily adopted privilege management solutions are powered by Thycotic. Thycotic’s security tools empower over 12,500 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, D.C., Thycotic operates worldwide with offices in the UK, Germany and Australia. For more information, please visit https://thycotic.com

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Finding Your Path to Zero Trust

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00