Access Management & Security
Facebook Twitter LinkedIn

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

Expert Talk
Wednesday, May 15, 2019 14:30—15:30
Location: WINTERGARTEN

Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.

Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them. Attendees will learn:

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Presentation deck
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Morey J. Haber
Morey J. Haber
BeyondTrust
Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three Apress books: Privileged...
Subscribe for updates
Please provide your email address