CyberCast: Minimizing Ransomware Exposure

CyberCast: Minimizing Ransomware Exposure

Watch Webinar

Kill Two Birds With One Stone: Ransomware & Privileged Access Abuse

While security awareness programs, regular updates to anti-malware, application whitelists, and data back-up cover your security basics, organizations need to understand that ransomware is just one form of exploit that can easily be replaced by another. According to Forrester, an estimated 80 percent of data breaches are tied to privileged access abuse.

By implementing Identity-Centric Privileged Access Management (PAM) based on Zero Trust principles, organizations can address the number one cause of today’s data breaches — privileged access abuse — while minimizing the impact of a ransomware attack.

Watch this CyberCast on-demand to learn the best practices to minimize your exposure to ransomware while protecting against credential-based cyber-attacks. During this session we discussed:

  • Ransomware trends
  • Business continuity considerations
  • Preventive measures
  • Identity-Centric PAM as a multi-purpose solution



Raun Nohavitza, Vice President, Cloud Operations and IT, Centrify

He leads the Infrastructure, Business Applications and Helpdesk teams, and is responsible for corporate Information Security.

Torsten George

Dr. Torsten George, Cybersecurity Evangelist, Centrify

He is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 25 years.

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us