У нас вы можете посмотреть бесплатно Morey J. Haber (BeyondTrust): Privileged Attack Vectors: Strategies for protecting your organization или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Privilege-based threats continues to evolve, increase in volume and complexity, and test the limits of existing security controls and solution implementations. And today, almost every security breach involves some aspect of privilege/privileged access—whether it be the initial point of compromise, or lateral movement and escalation of privileges once a threat actor has breached the network perimeter, or compromised an endpoint or identity. Join Morey J Haber, BeyondTrust CTO and CISO, in this presentation, to explore how privileges, insecure credentials— both human and machine, administrative rights, and remote access can be combined as an attack vector to breach any organization. Haber will also share insights from the recently released 2nd edition of his book Privileged Attack Vectors, including: Common and emerging threat vectors used in privileged attacks How privileged access management (PAM) controls disrupt key stages in the cyber attack chain. Top use cases and methodology for deploying a successful universal privilege access management program within an organization