www.brighttalk.com Open in urlscan Pro
23.36.238.122  Public Scan

Submitted URL: http://links.brighttalk.com/ls/click?upn=u001.MfOm4j6cWZ-2FQp-2FeUn5XDz9Lcs2f7rN6LJtpU9rFdMbujKMX2nvltdF2lqxiJGUK-2Frn-2FsPO...
Effective URL: https://www.brighttalk.com/webcast/19955/608161?utm_source=brighttalk-recommend&utm_campaign=network_weekly_email&utm_mediu...
Submission: On August 07 via api from OM — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

MAXIMIZE RISK REDUCTION WITH AN IDENTITY SECURITY APPROACH


Feb 21 2024
Duration: 30 mins



PRESENTED BY

CyberArk


ABOUT THIS TALK

The proliferation of identities, combined with cloud migration and accelerating
attacker innovation, has created the perfect storm for security teams facing a
surge in identity-based cyberattacks. Today, any identity can become privileged
based on what it can access and the actions it can take. Attackers increasingly
target a full spectrum of identities including workforce users – finance teams
and developers. For an organization to be secure, every identity must have the
right level of intelligent privilege controls. In this 30-minute session,
experts from CyberArk’s field technology office explain how to maximize risk
reduction by seamlessly managing and securing all identities. Key take aways
include: Market trends and a fresh take on the traditional attack path
Intelligent privilege controls and how to put them into practice Correlating
controls to levels of risk posed by users/access with minimal friction Identity
security platform requirements
Related topics:
Cloud Migration
Attack Vectors
Cyber Attacks
Identity Theft
Risk Mitigation
Privilege Controls
Risk Management
Identity Governance
Zero Trust
Privileged Access Management


MORE FROM THIS CHANNEL


CyberArk
Upcoming talks (1)
On-demand talks (74)
Subscribers (10333)
Centered on intelligent privilege controls, CyberArk provides the most
comprehensive
security offering for any identity - seamlessly securing human and machine
identities
accessing workloads from hybrid to multi-cloud, and flexibly automates the
identity lifecycle
all with continuous threat detection and prevention – protecting organization’s
identities a……