Third-Party Remote Access: The Hidden Weak Spot Exploited by Attackers

Logo
Presented by

Zhihao Tan, Regional PS Manager-ASEAN, Professional Services APJ, CyberArk;Moderator: SC Leung, APAC Council Member, (ISC)2

About this talk

Outsourcing is a critical strategy for supporting user productivity and business growth. Remote third-party access to an organization’s internal systems is an inherent requirement for outsourced services, maintenance, and support. Many companies overlook this remote vendor access as an area that requires tight security controls. But the fact is, 63% of attacks are caused by security vulnerabilities introduced by a third party. Join CyberArk and (ISC)2 on Jun 29, 2016 at 2:00p.m. (Singapore Time) for a Security Briefing that you will learn more about this hidden security weak spot – and discover 5 ways to mitigate risk of attack through remote third-party access.
Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (457)
Subscribers (70752)
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.