It is critically important to know how cyber criminals target their victims, what you can do to reduce the risk and make it more challenging for the attackers who steal your information, your identity or your money. This session will explain how outside attackers or malicious insiders can exploit vulnerabilities using examples such as a compromised email account password that escalates into a full-blown breach of network security.
Compromising a privileged account, therefore, can be the difference between a simple network breach and a cyber catastrophe. When a single system is compromised, it is typically easier to mitigate, isolate, and eradicate the risk and restore control. When a privileged account is breached, it can lead to a major disaster. That’s because when a privileged account gets hacked, it allows the attacker to impersonate a trusted employee or system and carry out malicious activity without being detected as an intruder. Once attackers compromise a privileged account, they can typically roam at will through an IT environment to steal information and wreak havoc.
To find out more join our head of research and innovation, David King and Thycotic on this session to learn more about how you can prevent privileged account hacks.
Date: Wednesday 9th May 2018
Time: 10:00am GMT (45 minutes)
In the meantime build your understanding of today’s biggest cyber security threat with a guide to everything involved in a hack, from the earliest reconnaissance to execution and covering tracks by downloading our FREE guide.