Phone Number +1-202-802-9399 (US)

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand

WATCH THIS WEBINAR

The Evolution of Perimeter Security: Where Are The New Boundaries?

Why do we continue to see so many cyber breaches? If we look at why most cyber breaches of the past year occurred, we see that it comes down to three major factors – the human factor, identities and credentials, and vulnerabilities. Living in a digital social society, we share more information, ultimately exposing ourselves to social-engineering and targeted spear-phishing attacks waged to compromise our systems for financial fraud or steal our identities to access trusted corporate information.  The perimeter has moved and we need to move with it. Learn about how identity and access management are evolving and becoming the new security perimeter.

During this session, Joseph Carson, Chief Security Scientist at Thycotic, will review:

• Why the traditional perimeter is no longer effective;
• What hacker techniques are being used to compromise organizations;
• What some governments are doing to protect their citizens; and
• What technologies can help create the new cyber security perimeter.


Watch the Webinar


 

SHARE THIS