25 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
The Anatomy of a Hack: Perception vs. R...
The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication. However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials. And it’s not just anecdotes. According to a recent study by Centrify, 74 percent of respondents acknowledge they were breached via access to a privileged account. Forrester agrees...
June 6, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
LIVE NATION'S SOLD-OUT TOUR -- THE ROAD...

CANCELED

Join us for a fireside chat with Live Nation Entertainment to talk about how they’ve implemented Zero Trust to improve their security posture. Torsten George sits down with Kris Howitt to chat about: Why old school mentality of security no longer worksHow to get buy-in from key stakeholders on implementing Zero Trust PrivilegeVendor selection process and key capabilities to look forResults and benefits achieved (e.g., meeting PCI DSS...
February 28, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Debunked: 5 Myths About Zero Trust Security
In 2018, Zero Trust Security gained popularity due to its simplicity and effectiveness. Yet despite a rise in awareness, many organizations still don’t know where to start or are slow to adopt a Zero Trust approach. The result? Breaches affected as many as 66% of companies just last year. And as hackers become more sophisticated and resourceful, the number of breaches will continue to rise - unless organizations adopt Zero Trust Security...
January 31, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Does Your Password Vault Do This?
Managing privileged account passwords is a first step to strengthen your security posture, but important gaps remain that can easily be exploited by bad actors. Learn how to combine password vaulting with the following, all while securing remote access and monitoring all privileged sessions: Brokering of identitiesMFA enforcementJust-enough privilege
January 24, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Debunked: 5 Myths About Zero Trust Security
Zero Trust Security has gained a lot of popularity over the last six months. Almost daily you can read articles about this security strategy (e.g., Forbes, ComputerWeekly, TechRepublic, CSO, Security Current). Both analysts (e.g., Forrester) and security professionals acknowledge the benefits it offers in the context of establishing effective ways to minimize the risk of falling victim to a cyber-attack. The reason why so many embrace Zero Tru...
August 28, 2018
Organizer: Centrify
Location: Webcast
Add Favorite
Back to Search Begin New Search