Phone Number +1-202-802-9399 (US)

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand

WATCH THIS WEBINAR

How to Hack a Privileged User in South Africa

Tuesday, June 20, 2017 | 11:00 AM CAT


Watch the Webinar


 

Criminal hackers and sophisticated state-sponsored attackers are going for the easiest, most vulnerable targets—your organization’s privileged users.

Even though hackers are highly-skilled, attacks on privileged account user passwords are relatively simple to execute. With up to 80% of breaches resulting from weak or stolen password credentials, exploiting unmanaged and unprotected privileged accounts is the easiest way to extract your company’s most critical data. And in many cases these exploited accounts can go undetected for several weeks or months.

Join Thycotic for a demonstration of how hackers gain control of Privileged User accounts by way of:

  • Shared accounts
  • Storing passwords in Excel
  • Pass-the-Hash attacks
  • Default Passwords
  • Former employees

As we illustrate each exploitation scenario, we will show you how to defend against these typical Privileged Account attacks with automated Privileged Account Management (PAM) security solutions. Don’t miss this chance to get a thorough introduction to the various password attack vectors most favored by hackers—and how you can stop them in their tracks.

SHARE THIS