VIRTUAL
The event has already taken place, thanks for checking!
Identity has become the new vulnerability perimeter—even if a network, endpoint, and all other devices are secured, a cyber-attacker only needs access to one privileged account to compromise enterprise resources. Identities are a company’s crown jewels for access and privilege in corporate systems, and attackers have begun to focus on compromised identities to enable data exfiltration, take over IT environments, and launch ransomware attacks. How can you protect your organization from attackers who exploit gaps between identities and your security systems?
Join us for a discussion and demonstration that will explore:
With over 20 years of experience, Jonathan is a passionate technical resource that has worked in many different industries and across complex network environments. Some areas of his focus have included threat intelligence, red teaming exercises, pretesting practices, application security, and media streaming services. Jonathan enjoys working with organizations and teams to help them navigate through the hurdles related to security.
This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.