InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Persistent Threat Of Exposed Credentials

Presented by

Daniel Pigeon, Sr. Product Marketing Manager

About this talk

Year after year, the use of compromised credentials is a top initial attack vector. Despite this risk being well understood among security teams, threat actors continue to leverage exposed credentials to gain unauthorized access to corporate networks, systems, and data. In this webinar, Cyberint Senior Product Marketing Manager Daniel Pigeon will drill down on the persistent risk of exposed credentials and discuss the many ways in which threat actors steal and use credentials in their attacks. Topics will include: - primary TTPs for credential theft - how exposed credentials are put to use - attacker techniques for bypassing MFA - risk mitigation strategies Join us on Wednesday, March 6th at 11:00am EST for insights on mitigating the risk of leaked credentials at your organization.
Cyberint, now a Check Point Company

Cyberint, now a Check Point Company

13560 subscribers41 talks
Impactful intelligence to help you detect & defeat cyber risks faster
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.
Related topics