** SESSION STARTS: 10:00 AM (ICT) | 11:00 AM (SGT/HKT) | 12:00 PM (JST/KST) | 1:00 PM (AEST) | 3:00 PM (NZT) **
Privilege-based threats continues to evolve, increase in volume and complexity, and test the limits of existing security controls and solution implementations. And today, almost every security breach involves some aspect of privilege/privileged access—whether it be the initial point of compromise, or lateral movement and escalation of privileges once a threat actor has breached the network perimeter, or compromised an endpoint or identity.
Join Morey J Haber, BeyondTrust CTO and CISO, in this special virtual session, exclusive to APJ, to explore how privileges, insecure credentials, administrative rights, and remote access can be combined as an attack vector to breach any organisation. Haber will also share insights from the recently released 2nd edition of his book "Privileged Attack Vectors", including:
- Common and emerging threat vectors used in privileged attacks
- How privileged access management (PAM) controls disrupt key stages in the cyber attack chain.
- Top use cases and methodology for deploying a successful universal privilege access management program within an organisation
Added Bonus! Watch this webinar live for the chance to receive one of 25 FREE copies of Morey J Haber’s book!
CPE Credit Qualification: Many of our webinars qualify as CPE credit. Please provide your
(ISC)2 ID certificate number when you register for the webinar and your CPEs will automatically be added to
your (ISC)2 account within 4-6 weeks.