Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Webcast: Mitigating Insider Threats and Breaches

Please join us on Tuesday, Feb. 3rd at 1PM ET for a special webcast: How To Avoid Being Tomorrow’s Headline: Mitigating Insider Threats and Breaches, presented by Centrify.

Please join us on Tuesday, Feb. 3rd at 1PM ET for a special webcast: How To Avoid Being Tomorrow’s Headline: Mitigating Insider Threats and Breaches, presented by Centrify.

 Are your privileged users putting your business at risk?

You might be granting your users too much privilege – even unintentionally – and dramatically increasing your potential attack surface. If over-privileged user credentials are compromised – or worse, misused by a disgruntled employee – your data and systems can be put at risk and your sensitive data can be stolen. Making you tomorrow’s headline.

Brad Zehring, Director of Product Management at Centrify, will discuss how insider threats – both seen and unseen – develop and offer approaches you can use to reduce your attack surface and mitigate the threat.

Can’t make the live event? Register now and we’ll send you an email with a link to watch it on demand.


Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Risk Management

A threat-based approach to security often focuses on a checklist to meet industry requirements but overlooked the key component of security: reducing risk.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Risk Management

CISA has published a report detailing the cybersecurity risks to the K-12 education system and recommendations on how to secure it.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.