Back to Search Begin New Search Save Search Auto-Notify
Securely Moving Workloads into the Cloud
Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. According to Gartner, spending on cloud infrastructure services will grow from $39.5 billion in 2019 to $63 billion through 2021. However, when transitioning to the cloud, it’s critical to understand that cloud security is a shared responsibility between the cloud service provider and the customer. The cloud servi...
September 27, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
5 Myths of Privileged Access Management...
IT professionals engaged in cloud migration projects are legitimately concerned about security. Their organizations may have deployed a Privileged Access Management (PAM) solution to secure on-premises infrastructure yet worry remains whether legacy PAM can adapt to secure the entire hybrid enterprise. But with information overload it is hard to tell fact from fiction. To help uncover the facts, we’re hosting a webinar on August 29th whe...
August 29, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
5 Steps to Minimize Your Exposure to Ra...
Ransomware attacks are dominating the headlines in 2019: City of Baltimore, ASCO Industries, and the Weather Channel are just a few of the examples. Holding someone or something for ransom is a simple yet effective criminal strategy used for thousands of years. Today, cybercriminals are applying these ancient techniques to modern technologies. And according to the FBI’s Internet Crime Complaint Center, the damages associated with ransomw...
July 25, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
The Anatomy of a Hack: Perception vs. R...
The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication. However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials. And it’s not just anecdotes. According to a recent study by Centrify, 74 percent of respondents acknowledge they were breached via access to a privileged account. Forrester agrees...
June 6, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
LIVE NATION'S SOLD-OUT TOUR -- THE ROAD...

CANCELED

Join us for a fireside chat with Live Nation Entertainment to talk about how they’ve implemented Zero Trust to improve their security posture. Torsten George sits down with Kris Howitt to chat about: Why old school mentality of security no longer worksHow to get buy-in from key stakeholders on implementing Zero Trust PrivilegeVendor selection process and key capabilities to look forResults and benefits achieved (e.g., meeting PCI DSS...
February 28, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Debunked: 5 Myths About Zero Trust Security
In 2018, Zero Trust Security gained popularity due to its simplicity and effectiveness. Yet despite a rise in awareness, many organizations still don’t know where to start or are slow to adopt a Zero Trust approach. The result? Breaches affected as many as 66% of companies just last year. And as hackers become more sophisticated and resourceful, the number of breaches will continue to rise - unless organizations adopt Zero Trust Security...
January 31, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Does Your Password Vault Do This?
Managing privileged account passwords is a first step to strengthen your security posture, but important gaps remain that can easily be exploited by bad actors. Learn how to combine password vaulting with the following, all while securing remote access and monitoring all privileged sessions: Brokering of identitiesMFA enforcementJust-enough privilege
January 24, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Debunked: 5 Myths About Zero Trust Security
Zero Trust Security has gained a lot of popularity over the last six months. Almost daily you can read articles about this security strategy (e.g., Forbes, ComputerWeekly, TechRepublic, CSO, Security Current). Both analysts (e.g., Forrester) and security professionals acknowledge the benefits it offers in the context of establishing effective ways to minimize the risk of falling victim to a cyber-attack. The reason why so many embrace Zero Tru...
August 28, 2018
Organizer: Centrify
Location: Webcast
Add Favorite
Back to Search Begin New Search