September Council Connect: Effective Defense Strategies Against Privileged Attacks

Register

Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. 

Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.

Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” attendees of this Council Connect will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them. 

Join the Arizona Technology Council and BeyondTrust on Wednesday, September 19 from 11:30AM-1:30PM at The Gladly for our first Council Connect of the quarter. A delicious three-course meal is included. Register now

Attendees will learn:

  • What is privileged access management (PAM)?
  • Best practices for assessing, prioritizing, and addressing internal and external privileged risks.
  • Twelve key steps to mitigate the threats of unmanaged privileges.

About the Presenter

Speaker will be Jeramy Schmitt, Vice President of Education & Enablement at BeyondTrust.

Presented By

BeyondTrust

Location

2201 E Camelback Rd.
Phoenix , AZ 85016

Venue

The Gladly

Date

September 19, 2018

Time

11:30AM-1:30PM

Cost

[AZTC Members, $35] [Non-Members, $50] [AZTC Annual Sponsors, Free]

Register