Phone Number +1-202-802-9399 (US)

How to Hack a Privileged User in South Africa

Tuesday, June 20, 2017 | 11:00 AM CAT | 1 CPE Credit

Criminal hackers and sophisticated state-sponsored attackers are going for the easiest, most vulnerable targets—your organization’s privileged users.

Even though hackers are highly-skilled, attacks on privileged account user passwords are relatively simple to execute. With up to 80% of breaches resulting from weak or stolen password credentials, exploiting unmanaged and unprotected privileged accounts is the easiest way to extract your company’s most critical data. And in many cases these exploited accounts can go undetected for several weeks or months.

Join Thycotic for a demonstration of how hackers gain control of Privileged User accounts by way of:

  • Shared accounts
  • Storing passwords in Excel
  • Pass-the-Hash attacks
  • Default Passwords
  • Former employees

As we illustrate each exploitation scenario, we will show you how to defend against these typical Privileged Account attacks with automated Privileged Account Management (PAM) security solutions. Don’t miss this chance to get a thorough introduction to the various password attack vectors most favored by hackers—and how you can stop them in their tracks.



The following two tabs change content below.

Anna Michniewska

Anna is a marketing professional with over 12 years experience within the cybersecurity and technology space, both at a strategic and tactical level, in global markets. At Thycotic, Anna works as a Marketing Director International leading the team and collaborating with channel partners in EMEA and APAC to drive B2B channel and end user demand generation for Thycotic products.
ISC-CPE Credit LogoInterested in CPE Credit for attending? Please provide your (ISC)2 ID certificate number when you register. You will then automatically see your CPE credit added to your (ISC)2 account within 4-6 weeks. Note, most Thycotic webinars qualify for 1 CPE credit.

Watch the Webinar