Artwork

内容由Anthony Guerra提供。所有播客内容(包括剧集、图形和播客描述)均由 Anthony Guerra 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

Delivering Defense in Depth: Best Practices for Preventing & Addressing Credential Compromise 

57:56
 
分享
 

Manage episode 409030766 series 1087695
内容由Anthony Guerra提供。所有播客内容(包括剧集、图形和播客描述)均由 Anthony Guerra 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

They represent the crown jewels for cybercriminals -- legitimate login credentials that will allow them an undetected entrance to your network. And while security executives are doing everything possible -- such as extensive training and phishing tests -- to guard against compromise, it's not a question of if but when someone will make a mistake and accidentally divulge their coveted username and password. If they do so, it's possible for threat actors to run amok undetected in your environment. However, new technologies and strategies mean that's no longer the case. In this timely webinar, we'll speak to security leaders who are working hard to understand identity risks, and are leveraging a defense-in-depth strategy to detect and respond to active threats as quickly as possible.

Source: Delivering Defense in Depth: Best Practices for Preventing & Addressing Credential Compromise on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

  continue reading

103集单集

Artwork
icon分享
 
Manage episode 409030766 series 1087695
内容由Anthony Guerra提供。所有播客内容(包括剧集、图形和播客描述)均由 Anthony Guerra 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

They represent the crown jewels for cybercriminals -- legitimate login credentials that will allow them an undetected entrance to your network. And while security executives are doing everything possible -- such as extensive training and phishing tests -- to guard against compromise, it's not a question of if but when someone will make a mistake and accidentally divulge their coveted username and password. If they do so, it's possible for threat actors to run amok undetected in your environment. However, new technologies and strategies mean that's no longer the case. In this timely webinar, we'll speak to security leaders who are working hard to understand identity risks, and are leveraging a defense-in-depth strategy to detect and respond to active threats as quickly as possible.

Source: Delivering Defense in Depth: Best Practices for Preventing & Addressing Credential Compromise on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.

  continue reading

103集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南