Learn to protect your company from a new wave of identity breaches

We think of cyber attacks as occurring at a single moment in time, but the reality is that some can take months to detect. With a global pandemic opening the gates to increasingly stealthy cyber assaults, the onus is on organizations to adopt new approaches to identity management.

The SolarWinds example is indicative of a new and more dangerous era when it comes to cybersecurity. Although the breach was detected in December 2020, SolarWinds CEO Sudhakar Ramakrishna traces the presence of probes from the nation-state behind the breach to as far back as January 2019 — almost two years in advance of detecting the breach.

Agility and flexibility are critical to an organization’s ability to compete, yet it takes more than operations and communications to foil threat actors — especially those sophisticated enough to compromise a large software supply chain with bad binary code while mimicking legitimate protocol traffic.

Find out: Who is creeping inside your security perimeter?

Are you aware of everything that’s happening inside your security perimeter? Do you have your identity security locked down? If you can’t answer “Yes” to either question, you’re running a massive risk. But you’re far from alone. In fact, almost three of four companies say they are less than confident they could thwart an identity breach.

Confidence begins with action. If you are interested in making identity security one of your strengths – not one of your blind spots – set aside an hour on June 15 to attend Who is creeping inside your security perimeter?

In this briefing, cybersecurity author Brennen Schmidt and CyberArk AVP and Country Manager Chris Ruetz will be joined by two other leading security executives to share lessons learned and provide recommendations on how to thwart a new wave of identity breaches. They’ll also be covering – among other things – why two-factor authentication alone is not sufficient; new risks around privileged access in the work-from-home era; and what methods attackers are employing to gain privileged access.


Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Glenn Weir
Glenn Weir
Content writer at IT World Canada. Book lover. Futurist. Sports nut. Once and future author. Would-be intellect. Irish-born, Canadian-raised.

Related Tech News

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Featured Reads