This resource is no longer available

Cover Image

The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication.

However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials.

In this webcast, Dr. Torsten George, Cybersecurity Evangelist at Centrify discusses the 3 major phases of the “cyberattack lifecycle” and how to prevent data exfiltration by:

  • Enforcing MFA
  • Using host-based auditing and monitoring
  • Leveraging machine learning algorithms to monitor, identify, and alert on high-risk activity
Vendor:
Centrify Corporation
Premiered:
Sep 4, 2019
Format:
Multimedia
Type:
Webcast

This resource is no longer available.