This resource is no longer available
The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication.
However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials.
In this webcast, Dr. Torsten George, Cybersecurity Evangelist at Centrify discusses the 3 major phases of the “cyberattack lifecycle” and how to prevent data exfiltration by:
- Enforcing MFA
- Using host-based auditing and monitoring
- Leveraging machine learning algorithms to monitor, identify, and alert on high-risk activity