Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications.
Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.
Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” attendees of this Council Connect will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them.
Join the Arizona Technology Council and BeyondTrust on Wednesday, September 19 from 11:30AM-1:30PM at The Gladly for our first Council Connect of the quarter. A delicious three-course meal is included. Register now.
Attendees will learn:
- What is privileged access management (PAM)?
- Best practices for assessing, prioritizing, and addressing internal and external privileged risks.
- Twelve key steps to mitigate the threats of unmanaged privileges.
About the Presenter
Speaker will be Jeramy Schmitt, Vice President of Education & Enablement at BeyondTrust.