Best Practices that Protect Workstations
With a rise of remote workers globally, there is heighten need to protect against attacks that begin at endpoints whether via phishing or another method of credential theft. Workstation targeted attacks revolve around privilege. As attackers aim for a foothold in your organization, they will steal and escalate credentials, manipulate applications and move laterally across the network.
In this session, we will focus on best practices for protecting your organization from advanced attacks including tips related to getting started with a discovery process, implementing policies to protect credentials and how to effectively mitigate risks of Ransomware.
We will also showcase practical ways to implement the principal of least privilege across all Windows and Mac workstations. See how CyberArk Endpoint Privilege Manager can be used to secure workstations.
Presenter: Dan Brostron, Solutions Engineer for CyberArk
*Earn up to 1 CPE credit