Hosted by SpyCloud
Virtual/Online – August 29, 2019, 8:30-9:30 p.m. PST / 11:30-12:30 p.m. EST
Protecting your enterprise from breaches and account takeovers has never been a bigger challenge. New tools make it possible for even unsophisticated actors to perform advanced, widespread attacks that put your organization at risk. According to the 2019 Verizon Breach Report, stolen credentials are the leading attack vector – yet in a recent study by Symantec, only 7% of respondents rated account takeover as a top threat to their cloud infrastructure.
Regardless of the thoughtful measures and policies you have in place, the hard truth is that no policy can protect you from human behavior. In this webinar, SpyCloud Head of Product Strategy Chip Witt will demonstrate how malicious actors take advantage of loopholes in your account takeover prevention plans. For example, your employees may be reusing compromised passwords to access corporate systems or signing up for 3rd party services like LinkedIn or Fantasy Football using their work credentials.
Register for this webinar to learn about:
- The anatomy of an account takeover attack
- Real-world examples of how employee password reuse can threaten your enterprise
- Potential holes in your account takeover plan
- What you can do to strengthen your security posture, including alignment to NIST