Hed Kovetz, Ron Rasin and Pramukh Arkalgud Ganeshamurthy
Automate your security operations and response to identity-based threats and behavior anomalies with Silverfort playbooks.
Learn how to:
• Automate threat enrichment with Silverfort’s continuous AI-driven risk data
• Automate step-up authentication with agentless multi-factor authentication
• Automate response to malicious user activities
• Automate service account security
• Automate the enforcement of dynamic zero-trust policies
Rich Peckham, Sr. Solution Architect, Silverfort, and Mike Carroll, Sr. Sales Engineer, Silverfort
After the initial breach, hackers need to progressively move through a network, in their search for target data and assets. Lateral movement is a term that refers to techniques they use.
Join us for a talk about the use of lateral movement techniques in various attacks. Rich and Mike will explain what lateral movement is, and show some attack demos. We will discuss the importance of detecting and blocking these attacks early on and demonstrate how it can be done.
You have to fill in this 5-page form if you want to install this app" said the cybersecurity officer. Sound familiar?
Cybersecurity is seen as a blocker by the average business user. Whether it's the annoying message about not being allowed to surf a perfectly legitimate website or the essay you have to write to justify your business-critical.
This is NOT to say that Cybersecurity is in the wrong here.
Join Ron Rasin, Jonathan Hope and Amar Singh, Global CISO as they discuss how you can maintain the balance between happy business users (not a common term, that) and joyful cybersecurity teams (yes, it is possible to make security people happy).
Some points of discussion:
– Technology and configurations to ensure maximum and transparent security
- Monitoring controls and tactical actions to silently uplift the security posture and more
Hed Kovetz, CEO and Co-Founder, Silverfort and Gil Kirkpatrick, Chief Architect, Semperis
Recent events forced us to change the way we work and today most employees are working remotely. While enabling remote access is critical these days, it’s also exposing us to more risk: when hundreds of users are inside the network – who is monitoring and validating that access to our most sensitive assets is legitimate and secure?
In this webinar, we will discuss why remote access is putting organizations at risk. We will review examples of relevant attacks that target our most critical assets, like Active Directory. Finally, we’ll discuss what should be done to mitigate the threat and protect sensitive assets from breach and compromise.
Silverfort integrates with Azure Active directly to influence conditional access policies in Azure AD in real-time and to deliver unified authentication policies.
Silverfort also integrates with the Microsoft Security Graph API to share the Silverfort’s continuous AI-driven risk assessment with Microsoft and to can get risk indicators from Microsoft to apply intelligent security policies across the board.
Silverfort's Authentication Platform can enforce secure authentication for any user on any system, including systems that were considered “Unprotectable” until today, without any modifications to endpoints and servers. This includes homegrown systems, IT infrastructure, IoT devices, dynamic IaaS environments and more. Silverfort enables organizations to address a wide variety of Zero Trust use cases and compliance needs, including secure migration of sensitive applications to the Cloud.
Watch this recorded webinar to learn:
* Why passwords are no longer a reliable factor of authentication.
* Why so many sensitive enterprise systems still aren’t protected by Multi-Factor Authentication (MFA).
* Why traditional MFA won’t cope with Zero Trust requirements.
How Silverfort’s technology allows full agent-less Adaptive Risk Based Authentication.
Multi-Factor Authentication has been around for decades, but still, 81% of data breaches involve the use of compromised passwords. We will examine how major changes in the technology landscape are challenging the effectiveness of current MFA solutions, and what can be done to secure corporate identities in this new reality.
About the speaker:
Head Kovetz is the CEO and co-founder of Silverfort, the provider of next-generation multi-factor authentication solutions. Prior to founding Silverfort, Hed served in product leadership positions at Verint, where he previously served as a group leader at the 8200 elite cyber unit of the Israel Defense Forces, where he received the unit’s excellence award and the Chief of Intelligence Corps Award for Innovation.
Silverfort extends secure authentication and Zero Trust policies across all sensitive assets, on-premises or in the cloud, without agents or proxies. This includes systems and interfaces that couldn't be protected until today like IT infrastructure, homegrown and legacy applications, file shares, databases, IoT devices and more.
In addition, Silverfort extends protection to interfaces and access tools that currently allow attackers to bypass all other MFA solutions (Remote PowerShell, PsExec, etc.)