Privileged Access Management: Breaking the Breach Kill Chain [JUN 24]

When:  Jun 24, 2016 from 12:00 PM to 01:00 PM (ET)

Event address for attendees: https://catechnologies.webex.com/catechnologies/onstage/g.php?MTID=efd290a418147ee02cc84831afded2759

 

It’s impossible for a day to pass in which we don’t hear news of yet another data breach, with its resulting loss of proprietary secrets, financial records or personal information. Security specialists have striven to establish perimeter-based defenses that, in the most simplistic of terms, keep the bad guys out and let the good guys in, but continual breaches offer evidence these perimeters have failed at their primary goal. As a consequence organizations are coming to grips with the realization an essential new layer of security, focused specifically on the protection and management of identities, is a critical new requirement in efforts to stem the tide of breaches.

 

Privileged Access Management solutions from CA Technologies provide a host of capabilities and controls that actively prevent attackers from carrying out key components of their attacks—breaking the breach kill chain—as well as delivering additional support for reducing risks, minimizing damage and speeding recovery in the event of a successful attack.

 

Speaker: @Chris_Sec_East

chris tippett.png

 

Get the White Paper: Breaking the Kill Chain - CA Technologies

 

Dial-in Information:

1-(866) 376-6162  (US) Call-in toll-free number

1-(816) 788-9003  (US) Call-in number

 

Conference Code: 379 355 1583

View global numbers



Location: WebEx

Contact

Kristen Palazzolo

malkr03@ca.com