Technologies: passwords

A common thread woven through many of today’s most far-reaching and highly publicized attacks is the role that inadequately controlled privileges play in giving malicious actors access to protected networks. In this informative webinar, IoT Security Guy Rob Black and Paul Roberts of The Security Ledger:

  • Analyze recent cybersecurity attacks and discussing ways to mitigate similar threats
  • Evaluate the role password breakdowns play in compromising organizations
  • Review a high level threat model of privileged accounts
  • Discuss how Privilege Access Management can reduce your cyber attack surface and improve your security posture

Date: 28.11.2018

Company website

Short description: Beyond Rules: How Natural Language Processing can Automate your SIEM

Date: 30.01.2018

Company website

Short description: Using Machine Learning to Spot and Block Targeted Attacks in Office 365

Date: 25.10.2018

Company website

Short description: Best Practices for Cell Phone Compliance and Security in Capital Markets

Date: 11.12.2018

Company website

Short description: Bring your own device policies are the norm but they carry significant cyber risks to corporate data and assets.

Date: 08.03.2018

Company website

Short description: CISSP, “The IoT Security Guy”, and Founder and Managing Principal of Fractional CISO, Rob Black joins Paul Roberts of Security Ledger to talk about privileged access management.