Briefings Part 2: Are You Prepared For the Next Attack?

Logo
Presented by

Christopher Wraight & Carole Gunst, Directors, Security Solutions, CA Technologies

About this talk

Today, usernames and passwords continue to be stolen and exploited in record numbers. Hackers are still stealing credentials and accessing sensitive data. To stay ahead of hackers, you need to combine the appropriate forms of authentication and application access/session management to reduce risk and to prevent security breaches before they happen. Please join CA Technologies to learn about risk appropriate authentication and SSO/access management capabilities that can help protect your organization from hackers and their popular attack vectors.

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (288)
Subscribers (107335)
(ISC)² hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.