Understanding Privileged Identity Theft

Presented by

Csaba Krasznay

About this talk

Cyber attackers use privileged identity theft, the compromise of credentials to privileged accounts, to steal massive amounts of data. To protect themselves, organizations need to understand the threat and how to implement the right security measures. From this 55-minutes on-demand webinar session you will learn about the methods used to compromise privileged accounts, why hackers target privileged accounts, why current security measures fail, and what steps you can take to stop these threats.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (30)
Subscribers (2260)
syslog-ng delivers log data critical to understanding what is happening in your IT environment. Whether it's user activity, performance metrics, Windows Event logs, network traffic or any other type of log data, syslog-ng can collect, process and centralize it in real time, and forward it to your analytics tool. You can remove data silos and gain full-stack visibility of your IT environment. With syslog-ng, you can build a one-stop log data shop, find the logs you need in seconds and greatly enhance your SIEM efficiency. For more information, visit syslog-ng.com About One Identity One Identity helps organizations optimize identity and access management. For more information, visit http://www.oneidentity.com. Short Copyright & Trademark: © 2018 One Identity LLC. ALL RIGHTS RESERVED. One Identity’s privacy policy: https://www.oneidentity.com/legal/privacy.aspx To unsubscribe: https://www.oneidentity.com/unsubscribe