Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps
- LANGUAGE: English DATE: Tuesday, December 06, 2016 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
The history of IT Security is only a generation old, yet the direction of the arms race has already changed completely several times. Initially, perimeter-based security – firewalls and anti-virus software – played the most important role at organizations. By the beginning of the new millennium the focus of security turned to identity-based solutions but IAM has also been shown not to be a silver bullet to protect against breaches.
The chances of getting breached seem to grow daily and could quickly become your company’s worst nightmare.
This webinar will look at some of the recent high profile breaches, their common failings, outcomes and points to note.
The biggest mistake you can make it assuming you cannot, or will never, be breached – the challenge for any company is to have a strategy that meets their risk appetite, security measures with a known ROI, a detection plan so that you know before your customers and a mitigation strategy for when the worst happens.
In this KuppingerCole webinar, you will learn about the three steps for moving to a modern approach to breach avoidance, mitigation and response:
- How to define your risk appetite
- Calculating the ROI on security solutions
- Planning for the breach
In the first part, Paul Simmonds, Fellow Analyst at KuppingerCole, will look at the companies and organizations that have been breached in recent times and give more details of the history, issues and solutions to consider when looking at how to mitigate a breach.
In the second part, Péter Gyöngyösi, Product Manager of Blindspotter will share Balabit´s point of view, of how to detect identify unusual user activities and provide deep visibility into potential threats.
Stefan-George-Ring 29 • 81929 München • Germany
Phone: +49 (0)89 9308 6477
Fax: +49 (0)89 9308 6467
Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.
2020 will go down in history as the year in which many companies gave their stagnating digital transformation initiatives a big new push. Due to the pandemic, organizations were forced to rapidly scale up their remote working facilities, secure employee-owned devices (Bring Your Own Devices (BYODs) , and maintain a secure environment for enterprise and customer identities . However, when it comes to their identity architecture, the picture is typically fragmented. They may have a general Identity and Access Management (IAM) platform from one company, a Privileged Access Management (PAM) solution from another, and some other pieces of IAM deployed, but still face gaps.
The European Identity & Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.