CA Part 3: Breaches: Why They Often Succeed & How to Avoid Being the Next Victim

Logo
Presented by

Dale Gardner, Dir, Security Solutions, CA Technologies, Brandon Dunlap, Brightfly

About this talk

Over a billion records were breached last year in online cyber-attacks. Even though the details of these breaches may differ, they often have the same root cause – inadequate control of privileged user accounts and their actions in increasingly complex hybrid environments. On November 12, 2015 at 1:00PM Eastern, join CA Technologies and (ISC)2 as we examine some of the most notorious breaches and the steps that attackers took to take control of these accounts. You will also learn how Privileged Access Management (PAM) can help prevent successful attacks and protect critical corporate and customer information.

Related topics:

More from this channel

Upcoming talks (12)
On-demand talks (436)
Subscribers (106924)
(ISC)² Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.