Best Practices For Stopping Theft and Abuse of Employee Credentials

Logo
Presented by

Nithin Varam, Lior Kolnik, Stan Lee, with Host Karin Shopen

About this talk

The theft and use of stolen passwords is a common attack for adversaries, mostly because passwords are the weakest link in security. Plus, stealing credentials is much faster, cheaper and easier than having to find and exploit a vulnerability in a system. Once done, an adversary can bypass the entire attack lifecycle – impersonating a valid user – and move freely through the network. With inside access, an attacker can quickly move laterally to set up a broader footprint, compromise additional systems and steal other credentials along the way. In our new webcast, Best Practices for Stopping Theft and Abuse of Employee Credentials, our experts will: *Outline the common techniques attackers use *Provide best practices to prevent further credential attacks *Showcase Palo Alto Networks features you can enable now to protect your organization Get your questions answered, and learn how to stop credential theft and abuse in your organization today.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (869)
Subscribers (107720)
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.