InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Understand Cross-Platform Account Takeovers & How to Protect Your Organization

Presented by

Mike Britton, CISO, Abnormal Security & Dave Gruber, Principal Analyst, Enterprise Strategy Group

About this talk

Recent research from Abnormal Security shows that account takeovers (ATOs) are a top concern for security leaders, with 77% ranking it among their three most concerning threats. To boot, 83% of Abnormal survey participants reported that their organization had been directly impacted by an ATO attack within the past year, and nearly 1 in 5 have been impacted more than 10 times. Given the frequency of these attacks you likely have a few questions: 1. How and why are account takeovers increasing? 2. Which applications are the most vulnerable? 3. And why is it difficult to detect and remediate compromised accounts? Abnormal Security CISO Mike Britton and Enterprise Strategy Group Principal Analyst Dave Gruber tackle these queries in the following 2024 RSA Conference session. Register and watch the session for Britton and Gruber’s indispensable takeaways, as well as an explanation of how Abnormal Security’s unified Account Takeover solution detects malicious activity to kick out hijackers across dozens of cloud applications.
Abnormal AI

Abnormal AI

16174 subscribers117 talks
Abnormally-Precise, Cloud-Native Email Security
Learn more about new approaches to email security to stop advanced business email compromise attacks that bypass traditional, threat intelligence-based email security solutions. Unlike legacy email security solutions, the Abnormal Security platform uses an innovative AI-based approach that deeply understands the people, relationships, and business processes to stop the most sophisticated and costly attacks.
Related topics