From Strategy to Tactics: Targeting and Protecting Privileged Accounts

  • Friday, 22 July, 2016 | 09.00 – 09.45 hrs | Peony Room 4402

View all Sessions

CyberArk Labs found that 88% of networks are significantly susceptible to compromise through privileged account credential theft or abuse. Neglected privileged passwords and SSH keys open up unnecessary attack surfaces causing vulnerabilities on networks. The high profile Bangladesh heist breach is just one example. Use this information to conceive your defence strategy and deploy best-in-practice tactics.


This document was retrieved from on Sun, 18 Aug 2019 22:44:42 -0400.