Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Best Practices that Protect Workstations

On-Demand Webinar

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
On-Demand  |  1 CPE Credit

With a rise of remote workers globally, there is heighten need to protect against attacks that begin at endpoints whether via phishing or another method of credential theft. Workstation targeted attacks revolve around privilege. As attackers aim for a foothold in your organization, they will steal and escalate credentials, manipulate applications and move laterally across the network.

In this session, we will focus on best practices for protecting your organization from advanced attacks including tips related to getting started with a discovery process, implementing policies to protect credentials and how to effectively mitigate risks of Ransomware.

We will also showcase practical ways to implement the principal of least privilege across all Windows and Mac workstations. See how CyberArk Endpoint Privilege Manager can be used to secure workstations.

Presenter: Dan Brostron, Solutions Engineer for CyberArk


Earn 1 CPE Credit

You can earn credit for this session as indicated. Attendees are responsible for submitting credit requests directly to relevant organizations as qualified.


REGISTER NOW

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world's leading companies — including more than 50% of the Fortune 500 — to protect their highest-value information assets, infrastructure and applications.