Thycotic Telephone Number +1-202-802-9399 (US)

The Evolution of Perimeter Security: Where Are The New Boundaries?

Why do we continue to see so many cyber breaches? If we look at why most cyber breaches of the past year occurred, we see that it comes down to three major factors – the human factor, identities and credentials, and vulnerabilities. Living in a digital social society, we share more information, ultimately exposing ourselves to social-engineering and targeted spear-phishing attacks waged to compromise our systems for financial fraud or steal our identities to access trusted corporate information.  The perimeter has moved and we need to move with it. Learn about how identity and access management are evolving and becoming the new security perimeter.

During this session, Joseph Carson, Chief Security Scientist at Thycotic, will review:

• Why the traditional perimeter is no longer effective;
• What hacker techniques are being used to compromise organizations;
• What some governments are doing to protect their citizens; and
• What technologies can help create the new cyber security perimeter.

 

Like this post?

Get our top blog posts delivered to your inbox once a month.

SHARE THIS


The following two tabs change content below.
mm

Chris Frishe

mm

Latest posts by Chris Frishe (see all)

ISC-CPE Credit LogoInterested in CPE Credit for attending? Please provide your (ISC)2 ID certificate number when you register. You will then automatically see your CPE credit added to your (ISC)2 account within 4-6 weeks. Note, most Thycotic webinars qualify for 1 CPE credit.

Watch the Webinar