31 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Human Insights on the RSA Human Element
The theme of the 2020 RSA Conference is the Human Element because humans are not only the most frequent cause of cyberattacks, but also the most powerful tool in preventing them. Each RSA Conference brings together thousands of your peers, offers hundreds of opportunities to learn from the industry’s most respected experts, and introduces attendees to the latest, most disruptive and cutting-edge cybersecurity approaches and solutions. Wh...
March 5, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
The Anatomy of a Hack: Perception vs. Reality
Learn the anatomy of a hack.Prevent a data breach. It’s a common belief that data breaches require a tremendous amount of sophistication to “break” through the almost impenetrable perimeter defenses that organizations have put in place. Hackers don't break in. They log in! Post-mortem analysis concludes that the source of a hack is most often compromised credentials, and the data proves it: 74 percent of respondents acknowled...
February 13, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Cybersecurity Best Practices: The Basic...
Cybersecurity Best Practices: The Basics and Beyond October is National Cybersecurity Awareness Month and a great time to take a critical look at your cybersecurity at home, in the office, and everywhere you go. Many people adopt different attitudes and practices regarding their personal and professional cybersecurity. It's our responsibility to protect not only ourselves but also our organizations. The first step is to be aware of modern thre...
October 29, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Securely Moving Workloads into the Cloud
Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. According to Gartner, spending on cloud infrastructure services will grow from $39.5 billion in 2019 to $63 billion through 2021. However, when transitioning to the cloud, it’s critical to understand that cloud security is a shared responsibility between the cloud service provider and the customer. The cloud servi...
September 27, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
5 Myths of Privileged Access Management...
IT professionals engaged in cloud migration projects are legitimately concerned about security. Their organizations may have deployed a Privileged Access Management (PAM) solution to secure on-premises infrastructure yet worry remains whether legacy PAM can adapt to secure the entire hybrid enterprise. But with information overload it is hard to tell fact from fiction. To help uncover the facts, we’re hosting a webinar on August 29th whe...
August 29, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
5 Steps to Minimize Your Exposure to Ra...
Ransomware attacks are dominating the headlines in 2019: City of Baltimore, ASCO Industries, and the Weather Channel are just a few of the examples. Holding someone or something for ransom is a simple yet effective criminal strategy used for thousands of years. Today, cybercriminals are applying these ancient techniques to modern technologies. And according to the FBI’s Internet Crime Complaint Center, the damages associated with ransomw...
July 25, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
The Anatomy of a Hack: Perception vs. R...
The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication. However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials. And it’s not just anecdotes. According to a recent study by Centrify, 74 percent of respondents acknowledge they were breached via access to a privileged account. Forrester agrees...
June 6, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
LIVE NATION'S SOLD-OUT TOUR -- THE ROAD...

CANCELED

Join us for a fireside chat with Live Nation Entertainment to talk about how they’ve implemented Zero Trust to improve their security posture. Torsten George sits down with Kris Howitt to chat about: Why old school mentality of security no longer worksHow to get buy-in from key stakeholders on implementing Zero Trust PrivilegeVendor selection process and key capabilities to look forResults and benefits achieved (e.g., meeting PCI DSS...
February 28, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Debunked: 5 Myths About Zero Trust Security
In 2018, Zero Trust Security gained popularity due to its simplicity and effectiveness. Yet despite a rise in awareness, many organizations still don’t know where to start or are slow to adopt a Zero Trust approach. The result? Breaches affected as many as 66% of companies just last year. And as hackers become more sophisticated and resourceful, the number of breaches will continue to rise - unless organizations adopt Zero Trust Security...
January 31, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Does Your Password Vault Do This?
Managing privileged account passwords is a first step to strengthen your security posture, but important gaps remain that can easily be exploited by bad actors. Learn how to combine password vaulting with the following, all while securing remote access and monitoring all privileged sessions: Brokering of identitiesMFA enforcementJust-enough privilege
January 24, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Back to Search Begin New Search