The bulk of network and system attacks originate at the endpoint from user accounts. In many cases, the attack is caused by stolen credentials. This attack can be one of the most damaging since the account was issued for a legitimate user initially and so is generally trusted. Sorting out the bad actors among the legitimate users can be challenging. In this series, we will explore the many ways organizations are attempting to solve this problem through User and Entity Behavior Analytics (UEBA), Endpoint Security, Security Awareness Training, and Identity and Access Management solutions.
Topics likely to be discussed in this series include:
---------------------------------
NOTE: CISO attendees are eligible to earn 4 CPE credit hours from our Breakfast Roundtables. Registrants must be present to claim their credit hours.