lp-ransomware-od.jpg

Kill Two Birds With One Stone:
Ransomware & Privileged Access Abuse

While security awareness programs, regular updates to anti-malware, application whitelists, and data back-up cover your security basics, organizations need to understand that ransomware is just one form of exploit that can easily be replaced by another. According to Forrester, an estimated 80 percent of data breaches are tied to privileged access abuse.

By implementing Identity-Centric Privileged Access Management (PAM) based on Zero Trust principles, organizations can address the number one cause of today’s data breaches — privileged access abuse — while minimizing the impact of a ransomware attack.

Watch this CyberCast on-demand to learn the best practices to minimize your exposure to ransomware while protecting against credential-based cyber-attacks. During this session we discussed:

  • Ransomware trends
  • Business continuity considerations
  • Preventive measures
  • Identity-Centric PAM as a multi-purpose solution

Speakers

Raun Nohavitza

Raun Nohavitza
Vice President, Cloud Operations and IT
Centrify

Dr. Torsten George

Dr. Torsten George
Cybersecurity Evangelist
Centrify