Register today!!
September 11, 2014
12pm ET
Privileged Identities: The Choke Point for Advanced Attacks
The most damaging attacks, whether from inside or outside the organization, have one thing in common: the use of privileged identities. Attackers use authorized or compromised privileged identities to gain access to information, attack new systems, and hide their tracks. Restricting access to compromised accounts is simply not enough. To mitigate damage from these attacks, a combination of capabilities, including fine-grained controls and governance is needed.
Join Russell Miller, Director, Security Solutions at CA Technologies to learn how with the right blend of processes and controls on privileged accounts, you can create a comprehensive and cohesive approach to securing your organization where it matters most.
*