Attack Vectors Thwarted by Least Privilege on the Endpoint

Presented by

Kevin Jermyn, Federal Customer Success Manager

About this talk

Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies. Learn about attack vectors exploiting excessive privilege on the endpoint and how Least Privilege methodology can thwart these attacks.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (118)
Subscribers (7780)
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!