IE11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

CyberCast Live: Minimizing Phishing Exposure

July 14, 2020 | 11:00 AM12:00 PM

Learn about best practices to minimize your exposure to phishing campaigns, which are typically the precursor for credential-based cyber-attacks.

CyberCast Live: Minimizing Phishing Exposure

July 14 at 8am PT

Register Now

MODERN PHISHING CAMPAIGNS AND EFFECTIVE PREVENTION

Phishing scams and schemes are becoming more creative every day as businesses and individuals find themselves the target of new tactics and techniques. User education and beefing up an organization’s email security systems are two essential steps that can minimize the exposure to phishing campaigns.

However, recent research indicates that these preventive measures are not effective, as nine out of 10 verified phishing emails find their ways past perimeter defenses. Considering that most of today’s cyber-attacks are front ended by phishing, organizations need to adapt their cybersecurity defenses and focus on identity as the new security perimeter.

By implementing Identity-Centric Privileged Access Management (PAM) based on Zero Trust principles, organizations can significantly minimize the exposure of phishing campaigns by providing an in-depth defense strategy against credential-based attacks.

Join our CyberCast to learn more about best practices to minimize your exposure to phishing campaigns, which are typically the precursor for credential-based cyber-attacks. During the lively discussion we’ll cover:

  • Phishing trends
  • Types of phishing campaigns
  • Tell takes of phishing campaigns
  • Preventive considerations
  • Identity-Centric PAM as a strong failsafe

SpeakersDr. Torsten George
Cybersecurity Evangelist
Centrify

Michelle Ellis
Information Security and Compliance Manager
Centrify

Register Now

As organizations continue their digital transformation journeys, they struggle to manage identities that are fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs. Centrify Identity-Centric PAM addresses this challenge with a cloud-native solution that simplifies privilege management by centralizing identities, and establishes a per-machine root of trust. Administrative management and access is seamless, security and co