Control The Access, Control The Asset

Presented by

Joe Schorr, Chris Clarkson

About this talk

An increasing number of high-profile data breaches are being traced back to compromised third-parties. Cybercriminals know that many companies have poor policies and technology in place to manage vendor access to their network. If a hacker takes advantage of vendor vulnerabilities and accesses your network disguised as a legitimate third-party, they typically have weeks or months to move around and gain access to critical systems. This webinar will feature a live hack that will show step by step how cyber criminals gain footholds into your network and ultimately infiltrate sensitive systems. You will also hear results from groundbreaking research on why vendor vulnerabilities exist, and offer solutions for what companies can do to increase their security posture and mitigate the threat from third-party access.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (6)
Subscribers (3881)
Gain knowledge and learn best practices related to internal and external tech support from industry experts and Bomgar customers and partners.