How to stop the Insider Threat: Protect yourself from Privileged Users
- LANGUAGE: English DATE: Tuesday, May 06, 2014 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors, the risk for your sensitive information is immense.
When looking to improve Information Security and mitigate risks, stopping the internal threat is your #1 task. The most important action herein is protecting yourself from the harm privileged users can cause.
In this KuppingerCole Webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will explain the changing threat landscape and focus on the specific role privileged users have therein.
In the second part, Jonathan Cogley and Ben Yoder of Thycotic Software will dive deeper into the details of insider threat: How to identify privileged accounts and bring them under control. Thycotic will explain how to efficiently reduce the attack surface in your organization and mitigate insider threats.
ThycoticCentrify is a leading cloud identity security vendor, enabling digital transformation at scale. ThycoticCentrify's industry-leading privileged access management (PAM) solutions reduce risk, complexity, and cost while securing organizations' data, devices, and code across cloud, on-premises, and hybrid environments. ThycoticCentrify is trusted by over 14,000 leading organizations around the globe including over half of the Fortune 100, and customers include the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.
Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective with users, devices and workloads moving outside the corporate network, but success depends on understanding the essential components of a Zero Trust Architecture.