Resources

CyberCast: Minimizing Ransomware Exposure

CyberCast: Minimizing Ransomware Exposure

Kill Two Birds With One Stone: Ransomware & Privileged Access Abuse

While security awareness programs, regular updates to anti-malware, application whitelists, and data back-up cover your security basics, organizations need to understand that ransomware is just one form of exploit that can easily be replaced by another. According to Forrester, an estimated 80 percent of data breaches are tied to privileged access abuse.

By implementing Identity-Centric Privileged Access Management (PAM) based on Zero Trust principles, organizations can address the number one cause of today’s data breaches — privileged access abuse — while minimizing the impact of a ransomware attack.

Watch this CyberCast on-demand to learn the best practices to minimize your exposure to ransomware while protecting against credential-based cyber-attacks. During this session we discussed:

  • Ransomware trends
  • Business continuity considerations
  • Preventive measures
  • Identity-Centric PAM as a multi-purpose solution

SPEAKERS

raun-nohavitza

Raun Nohavitza, Vice President, Cloud Operations and IT, Centrify

He leads the Infrastructure, Business Applications and Helpdesk teams, and is responsible for corporate Information Security.

Torsten George

Dr. Torsten George, Cybersecurity Evangelist, Centrify

He is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 25 years.

The form could not be loaded. This is most likely due to strict tracking protection in your browser.

Ready to Protect Against the #1 Attack Vector?

Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.

Free Trial