Privileged Attack Vectors - Building Effective Defence Strategies to Protect Organizations

Network Security and Ransomware Theatre

Thu 27th Sep 09:30 to 10:00

Cyber-attacks continue to increase in volume and sophistication. As a result data breaches are no longer surprising or even news worthy. It’s not a matter of if, but a matter of when you will be successfully breached. This session will provide a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors and how you can properly take measurable steps to defend against them.

What you will take away from this session

  • Know how identities, credentials, passwords and exploits can be leveraged to escalate privileges during an attack
  • Implement defensive and auditing strategies to mitigate the threats and risk
  • Understand a 12 step privileged access management implementation plan
  • Consider deployment and scope, including risk, auditing regulations and oversight solutions

Speakers

Photo Speaker Name Profile
Morey J. Haber Morey J. Haber View Profile
Top