Phone Number +1-202-802-9399 (US)

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand

WATCH THIS WEBINAR

How to Hack a Privileged User in South Africa

Tuesday, June 20, 2017 | 11:00 AM CAT | 1 CPE Credit

Criminal hackers and sophisticated state-sponsored attackers are going for the easiest, most vulnerable targets—your organization’s privileged users.

Even though hackers are highly-skilled, attacks on privileged account user passwords are relatively simple to execute. With up to 80% of breaches resulting from weak or stolen password credentials, exploiting unmanaged and unprotected privileged accounts is the easiest way to extract your company’s most critical data. And in many cases these exploited accounts can go undetected for several weeks or months.

Join Thycotic for a demonstration of how hackers gain control of Privileged User accounts by way of:

  • Shared accounts
  • Storing passwords in Excel
  • Pass-the-Hash attacks
  • Default Passwords
  • Former employees

As we illustrate each exploitation scenario, we will show you how to defend against these typical Privileged Account attacks with automated Privileged Account Management (PAM) security solutions. Don’t miss this chance to get a thorough introduction to the various password attack vectors most favored by hackers—and how you can stop them in their tracks.


Watch the Webinar


 

SHARE THIS

ISC-CPE Credit LogoInterested in CPE Credit for attending? Please provide your (ISC)2 ID certificate number when you register. You will then automatically see your CPE credit added to your (ISC)2 account within 4-6 weeks. Note, most Thycotic webinars qualify for 1 CPE credit.