The COVID-19 outbreak has swept the world and countries are scrambling to cope with infections and deaths. How is COVID-19 an adversity for businesses on the cyber security front and an opportunity for cyber criminals?
Watch this on-demand webinar as we show you real-life examples of cyber attacks riding on the waves of COVID-19 and best practices to help you avoid becoming a victim of a COVID-19 themed cyber attack.
To support businesses enable a safe and secure mobile workforce, you are also entitled to complimentary use of selected security solutions. More details will be shared during the webinar.
Register for Event
For more information, contact Shaylin Lutrario at (201) 474-4281
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. For the attacker, the path of least resistance is to leverage a combination of credentials and available connections between one system and another natively available within the network, often referred to as "living off the land."
At the root of this are the challenges inherent in identity access management (IAM) and privilege control. Even organizations that have deployed privileged user management or privileged access management (PAM) tools still struggle with local credentials stored on systems that can be abused.
This webcast - co-presented with SANS - outlines methods for improving the process of monitoring and managing threats as well as how to better control identity access management (IAM) and privileged accounts by utilizing the Illusive Networks Attack Surface Manager (ASM).
For more information about this or any of Gotham’s Services, please click the link below and complete the contact form.
Be the first to know about our latest events, webinars, and job openings!
Gotham Technology Group, LLC
5 Paragon Drive
Montvale, NJ 07645