Mission Possible: Executing a 30-Day Sprint to Protect Privileged Credentials

Logo
Presented by

Bryan Murphy, Consulting Services Manager, CyberArk, Nathaniel Ford, Morderator, (ISC)² EMEA

About this talk

To avoid a data breach you ultimately need to understand the techniques attackers are using and what security controls can stop them. Organisations that have already been breached are the best source of information. Join us for a live webinar where we will provide an inside look into the lessons learned from several high-profile data breaches. We will discuss lessons learned from security professionals and technical experts who have been on the front lines of breach remediation and outline a proven framework for an intensive sprint of approximately 30 days to implement a set of key controls around privileged credentials.

Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (394)
Subscribers (70173)
(ISC)² Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs