IE11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

The Anatomy of a Hack: Perception vs. Reality

February 13, 2020 | 2:00 PM

True or False? Data breaches require a tremendous amount of sophistication, “breaking” through an almost impenetrable perimeter. Check out this webinar to discover the truth.

The Anatomy of a Hack: Perception vs. Reality

Learn the anatomy of a hack.

Prevent a data breach.


It’s a common belief that data breaches require a tremendous amount of sophistication to “break” through the almost impenetrable perimeter defenses that organizations have put in place.


Hackers don't break in. They log in!


Post-mortem analysis concludes that the source of a hack is most often compromised credentials, and the data proves it:


  • 74 percent of respondents acknowledge access to a privileged account was used in a breach, according to a study by Centrify.
  • 80 percent of security breaches involve compromised privileged credentials according to Forrester.

Register to learn the 3 major phases of the “cyber-attack lifecycle” (aka “kill chain”) and important measures for preventing data exfiltration, including:


  • Enforcing MFA
  • Using host-based auditing
  • Leveraging machine learning algorithms to monitor, identify, and alert on high risk activity


Dr. Torsten George

Cyber Security Evangelist



You’ll get the recording and slides even if you don’t show up, so register today for this complimentary webinar HERE.



As organizations continue their digital transformation journeys, they struggle to manage identities that are fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs. Centrify Identity-Centric PAM addresses this challenge with a cloud-native solution that simplifies privilege management by centralizing identities, and establishes a per-machine root of trust. Administrative management and access is seamless, security and co