How to stop the Insider Threat: Protect yourself from Privileged Users

  • LANGUAGE: English DATE: Tuesday, May 06, 2014 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Upcoming Webinars
The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors, the risk for your sensitive information is immense.

When looking to improve Information Security and mitigate risks, stopping the internal threat is your #1 task. The most important action herein is protecting yourself from the harm privileged users can cause.

In this KuppingerCole Webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will explain the changing threat landscape and focus on the specific role privileged users have therein.

In the second part, Jonathan Cogley and Ben Yoder of Thycotic Software will dive deeper into the details of insider threat: How to identify privileged accounts and bring them under control. Thycotic will explain how to efficiently reduce the attack surface in your organization and mitigate insider threats.


Platinum Sponsors

Speakers

Jonathan grew up in South Africa and began his software engineering career in London where he founded Thycotic Software Ltd in 1996, moving Thycotic headquarters to the United States several years later. Thycotic is recognized as the fastest growing private company in identity and access...

Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...

Ben Yoder is a software engineer turned product manager and a lover of all things IT. He’s an expert on technology integrations and database systems, manages Thycotic Software’s market-leading Privileged Account Management solution, and keeps a keen eye on product trends in the IT...


Platinum Sponsor

Thycotic, a global leader in next-generation IT security solutions, delivers an indispensable, comprehensive Privileged Account Management (PAM) solution to protect your “keys to the kingdom” from cyber-attacks and insider threats.  Unlike any other security offering, Thycotic Secret Server assures the protection of privileged accounts while being the fastest to deploy, easiest to use, scalable enterprise-class solution offered at a competitive price. Already securing privileged account access for more than 3,500 organizations worldwide, including Fortune 500 enterprises, Thycotic Secret Server is simply your best value for PAM protection. For more information, please visit www.thycotic.com.

 

Watch now

Downloads

Presentation, KuppingerCole

Presentation, Thycotic

Webcast download

Popular Webcasts

Next Webinar

Webinar

You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.

Next Conference

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.

Next Seminar

Leadership Seminar

Identity and Access Management Crash Course

Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00