CyberArk Labs Deconstructing Attacker Methods in Recent Breaches

Logo
Presented by

Andy Thompson

About this talk

In an era where cyber threats are evolving at an unprecedented pace, understanding the tactics and techniques used by attackers is crucial for effective defense. This webinar, presented by CyberArk Labs, delves into some of the most significant breaches of the year, offering an in-depth analysis of the methodologies employed by cyber adversaries. We will explore how these attacks were orchestrated, identifying the common threads and unique strategies that made them successful. Watch to gain a clearer understanding of the current threat landscape.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (93)
Subscribers (14326)
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.