English   Deutsch   Русский   中文    
May 06, 2014
4:00pm CET, 10:00am EDT, 7:00am PDT

How to stop the Insider Threat: Protect yourself from Privileged Users

The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors, the risk for your sensitive information is immense.
Google+

When looking to improve Information Security and mitigate risks, stopping the internal threat is your #1 task. The most important action herein is protecting yourself from the harm privileged users can cause.

In this KuppingerCole Webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will explain the changing threat landscape and focus on the specific role privileged users have therein.

In the second part, Jonathan Cogley and Ben Yoder of Thycotic Software will dive deeper into the details of insider threat: How to identify privileged accounts and bring them under control. Thycotic will explain how to efficiently reduce the attack surface in your organization and mitigate insider threats.

Speakers

Jonathan Cogley Jonathan Cogley
CEO
Thycotic Software

Jonathan grew up in South Africa and began his software engineering career in London where he founded Thycotic Software Ltd in 1996, moving Thycotic headquarters to the United States several years later. Thycotic is recognized as the fastest growing private company in identity and access... More 
Martin Kuppinger Martin Kuppinger
Principal Analyst
KuppingerCole

Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist... More 
Ben Yoder Ben Yoder
Product Manager
Thycotic Software

Ben Yoder is a software engineer turned product manager and a lover of all things IT. He’s an expert on technology integrations and database systems, manages Thycotic Software’s market-leading Privileged Account Management solution, and keeps a keen eye on product trends in the IT... More 


Platinum Sponsor

Thycotic Software Ltd. Thycotic Software Ltd.
1101 17th St. NW, Suite 1102 • 20036 Washington, DC
Phone: +1 202 600 2646
Fax: +1 202 315 3315
Internet: http://www.thycotic.com

Thycotic IT security and password management solutions empower companies to remove the complexities associated with proper access control and management of privileged accounts. An Inc. 5000 company, Thycotic is recognized as the fastest growing, privately held privileged management provider in the USA. Secret Server privileged account management vaults, manages and audits privileged accounts across a company’s entire IT infrastructure. Thycotic also provides end-user password management and self-service AD group management tools. Rated #1 in customer satisfaction and trusted by more than 3,000 organizations worldwide – including members of the Fortune 500, enterprises, government agencies, technology firms, universities, non-profits, and managed service providers.


top
Download
Presentation, KuppingerCole
Presentation, Thycotic
Information
Language
English

Date
May 06, 2014
4:00pm CET, 10:00am EDT, 7:00am PDT

Contact person
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
Partners
More events
Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis
Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays,...
From static roles to dynamic attribute-based authorisation - Authorise flexibly, make decisions in real time, ensure compliance
Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the...
Universal SSO: Strategies & Standards for Single Sign-on Across Web and Native Applications
Many organizations have had some form of Web Access Management solution deployed for years. Whether this is pure-play Web Access Management,...
All current events
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole