Webinar Recording

How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Show description
Speakers
Alexei Balaganski
Lead Analyst & CTO
KuppingerCole
Alexei Balaganski
Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API security to security analytics, information protection, and AI-based security automation. He holds a...
View profile
Wade Lance
Principal Solutions Architect
Illusive Networks
Wade Lance
Wade Lance has been productizing new technologies in education, healthcare and information security for over 20 years. He has diverse experience in solution design for global 1000 cybersecurity teams, an extensive background in advanced cyber-attack detection, and a specialty in cyber deception...
View profile
Lead Sponsor
Illusive Networks
Top related content
Event Recording
Jonathan Sander - Starting Real Cybersecurity Means Protecting Credentials
Aug 10, 2018

An Expert Stage presentation at the European Identity and Cloud Conference 2018

Webinar Recording
Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged Accounts
Jun 23, 2017

Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. But what if instead of scrupulously designing access policies and rigorously monitoring every privileged account’s activities to prevent a malicious user from misusing their privileges one could stop giving anyone privileged access at all? Why delegate access to a sensitive system when you can delegate a specific task?

Event Recording
The Changing Cyber Threat Landscape and its impact on IAM (II)
May 11, 2022
Webinar Recording
How to Stop the Insider Threat: Protect Yourself from Privileged Users
May 06, 2014

KuppingerCole Webinar recording

Event Recording
Workshop | Your Path to Ransomware Resilience
Nov 09, 2021

Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Current surveys and KuppingerCole´s own research indicate a steep rise not only in the number of attacks, but as well in the average damage  per incident. The dark side of digital is industrializing itself, turning ransomware into big business The question is no longer if and when your organization will be attacked, but whether and how successful the attackers will be. “Sophisticated recent ransomware attacks are fully aware of standard backup strategies and corrupt or destroy your one and only option to recover without paying the ransom.” says KuppingerCole´s Cybersecurity Lead Christopher Schütze.  “The complexity of today´s multicloud environments require more than traditional backup & restore approaches” he continues.

In this workshop, we will provide you with an overview on the pillars of a proactively resiliient IT Infrastructure. Starting with an individual ransomware resilience assessment, each participant will (individually and anonymously) benchmark the resilience of her organization against ransomware attacks, relative to the average value of the whole group that conducted the assessment. The key topics of this workshop will be:

  1. The state of ransomware, from a business and a technical perspective
  2. The ransomware attack surface 
  3. Ransomware Resiliency Essentials: Preparation 
  4. Ransomware Resiliency Essentials: Protection
  5. Ransomware Resiliency Essentials: Response 
  6. Ransomware Resiliency Essentials: Recovery 
  7. Your individual ransomware risk and what to do now
Webinar Recording
Breaking the Ransomware Attack Chain
Oct 05, 2022

At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain. Join security experts from KuppingerCole Analysts and BeyondTrust to find out why digital transformation has massively increased the attack surface, what you need to know about ransomware, why it appears to be winning, and how to create effective defenses against it. 

John Tolbert, Lead Analyst at KuppingerCole is joined by Brian Chappell, Chief Security Strategist at BeyondTrust to discuss what security practices can realistically be implemented to defend against ransomware, which has become one of the most common cyber threats facing most organizations, particularly those in the energy, shipping, wholesale, retail, healthcare and financial industry sectors. These experts and security industry veterans will also discuss the role that Privileged Access Management (PAM) can play in mitigating the risks of ransomware and other cyber threats by reducing the opportunities for attackers to access and navigate targeted IT environments.

Webinar Recording
Surviving the Cyber Security Attack Wave
Oct 14, 2011

KuppingerCole Webinar recording

Event Recording
From Zero to Full Domain Admin: The Real-World Story of a Ransomware Attack
Sep 15, 2021
Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic
Webinar Recording
Protecting the Keys to Your Kingdom Against Cyber-Attacks and Insider Threats
Dec 15, 2015
Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering just one of these questions with "no" or "don't know" puts the most valuable data assets of your enterprise at risk.