Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps
- LANGUAGE: English DATE: Tuesday, December 06, 2016 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
The history of IT Security is only a generation old, yet the direction of the arms race has already changed completely several times. Initially, perimeter-based security – firewalls and anti-virus software – played the most important role at organizations. By the beginning of the new millennium the focus of security turned to identity-based solutions but IAM has also been shown not to be a silver bullet to protect against breaches.
The chances of getting breached seem to grow daily and could quickly become your company’s worst nightmare.
This webinar will look at some of the recent high profile breaches, their common failings, outcomes and points to note.
The biggest mistake you can make it assuming you cannot, or will never, be breached – the challenge for any company is to have a strategy that meets their risk appetite, security measures with a known ROI, a detection plan so that you know before your customers and a mitigation strategy for when the worst happens.
In this KuppingerCole webinar, you will learn about the three steps for moving to a modern approach to breach avoidance, mitigation and response:
- How to define your risk appetite
- Calculating the ROI on security solutions
- Planning for the breach
In the first part, Paul Simmonds, Fellow Analyst at KuppingerCole, will look at the companies and organizations that have been breached in recent times and give more details of the history, issues and solutions to consider when looking at how to mitigate a breach.
In the second part, Péter Gyöngyösi, Product Manager of Blindspotter will share Balabit´s point of view, of how to detect identify unusual user activities and provide deep visibility into potential threats.
Stefan-George-Ring 29 • 81929 München • Germany
Phone: +49 (0)89 9308 6477
Fax: +49 (0)89 9308 6467
Balabit’s Contextual Security Intelligence Suite protects organizations in real-time from threats posed by the misuse of high risk and privileged accounts. Solutions include reliable system and application Log Management with context enriched data ingestion, Privileged User Monitoring and User Behavior Analytics. Together they can identify unusual user activities and provide deep visibility into potential threats. Working in conjunction with existing control-based strategies Balabit enables a flexible and people-centric approach to improve security without adding additional barriers to business practices. Founded in 2000 Balabit has a proven track record including 23 Fortune 100 customers amongst over 1,000,000 corporate users worldwide.
When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges on the way from legacy IAM to a modern IAM infrastructure are manifold and should be considered beforehand.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.