The Anatomy of a Hack: Perception vs. Reality
Learn the anatomy of a hack.
Prevent a data breach.
It’s a common belief that data breaches require a tremendous amount of sophistication to “break” through the almost impenetrable perimeter defenses that organizations have put in place.
Hackers don't break in. They log in!
Post-mortem analysis concludes that the source of a hack is most often compromised credentials, and the data proves it:
- 74 percent of respondents acknowledge access to a privileged account was used in a breach, according to a study by Centrify.
- 80 percent of security breaches involve compromised privileged credentials according to Forrester.
Register to learn the 3 major phases of the “cyber-attack lifecycle” (aka “kill chain”) and important measures for preventing data exfiltration, including:
- Enforcing MFA
- Using host-based auditing
- Leveraging machine learning algorithms to monitor, identify, and alert on high risk activity
SPEAKER
Dr. Torsten George
Cyber Security Evangelist
Centrify
You’ll get the recording and slides even if you don’t show up, so register today for this complimentary webinar HERE.