Control the access, control the asset

Presented by

William Culbert, Director of Solutions Engineering, Bomgar

About this talk

A continuing trend of high-profile data breaches are being traced back to compromised third-parties. Cybercriminals know that many companies have poor policies and technology in place to manage vendor access to their network. If a cybercriminal takes advantage of vendor vulnerabilities and accesses your network disguised as a legitimate third-party, they typically have weeks or months to move around and gain access to critical systems. This webinar will feature a live hack that will show step by step how cyber criminals gain footholds into your network and ultimately infiltrate sensitive systems. You will also hear results from our research on why vendor vulnerabilities exist and offer solutions for what companies can do to improve their security posture and means of mitigating the threat presented by third-party access.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (49)
Subscribers (4955)
Our channel is aimed to give you the full picture. We will educate you on current topics of interest with the Editor of IT Security Guru hosting the webcasts, Dan Raywood. Guest speakers will join in on the debates with their own expert view and no intention of keeping it to themselves. Our aim is to give you all the information you need, for you to be able to come to your own conclusion.