Hi [[ session.user.profile.firstName ]]

Understanding Privileged Identity Theft

Cyber attackers use privileged identity theft, the compromise of credentials to privileged accounts, to steal massive amounts of data. To protect themselves, organizations need to understand the threat and how to implement the right security measures.

From this 55-minutes on-demand webinar session you will learn about the methods used to compromise privileged accounts, why hackers target privileged accounts, why current security measures fail, and what steps you can take to stop these threats.
Recorded Oct 12 2017 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Csaba Krasznay
Presentation preview: Understanding Privileged Identity Theft

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How can you regain the control of your privileged accounts? Recorded: Jun 13 2018 57 mins
    Csaba Krasznay, PhD.
    Balabit, a One Identity business,will present some shocking research statistics and instructive breach stories involving the misuse of privileged credentials.

    Balabit’s recent global research showed that 4 in 5 companies were hit by a breach in 2017. In this kind of landscape, with both cyber-attacks and privileged users proliferating simultaneously – and with the GDPR re-framing our relationship with data security – now’s the time for IT teams to get better control of their networks.

    In our 45-minute webinar session, you’ll hear about our key research findings and recommendations to reduce your risks related to privileged accounts. The webinar will be held by Csaba Krasznay, PhD., CISSP,
    Security Evangelist and Program Director of Cybersecurity Academy at the National University of Public Service in Hungary.
  • Managing privileged access and operations and ensuring GDPR compliance Recorded: May 16 2018 46 mins
    Istvan Molnar, Ronald Schmid
    As GDPR is coming into force on the 25th of May, Balabit, a One Identity business, is launching a webinar session for both existing customers and to organizations facing difficulties in terms of managing privileged user access to personal data storages units.

    When it comes to managing privileged access and users there is more to it than preventing unauthorized access to Personal Data. Compliance to the GDPR is heavily dependent on monitoring workflows and ensuring that all processes align with the requirements.

    Join us on our 30 minute webinar session where you can find out how to manage privileged access and operations to ensure GDPR compliance with the help of Balabit's Privileged Session Management.
  • Understanding Privileged Identity Theft Recorded: Oct 12 2017 55 mins
    Csaba Krasznay
    Cyber attackers use privileged identity theft, the compromise of credentials to privileged accounts, to steal massive amounts of data. To protect themselves, organizations need to understand the threat and how to implement the right security measures.

    From this 55-minutes on-demand webinar session you will learn about the methods used to compromise privileged accounts, why hackers target privileged accounts, why current security measures fail, and what steps you can take to stop these threats.
  • Accelerate Your Incident Response with Privileged Access Management Recorded: Jul 6 2017 53 mins
    Csaba Krasznay
    Following an incident, the simple question “Who did what?” is one of the most critical, yet most difficult, questions to answer.

    From this 52-minutes on-demand webinar session, you will learn incident investigation best practices. We present a real-life incident investigation scenario and show how advanced privileged access management tools can help you in the forensics process related to privileged account misuse.
One Identity - Identity and Access management
One Identity, a Quest Software business, helps organizations get identity and access management (IAM) right. With a unique combination of offerings including a portfolio of identity governance, access management and privileged access management. More than 7,500 customers worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their data -- wherever it might reside.

For more information, visit http://www.oneidentity.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Understanding Privileged Identity Theft
  • Live at: Oct 12 2017 11:10 am
  • Presented by: Csaba Krasznay
  • From:
Your email has been sent.
or close