Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Making Sense of the Uber Breach

On-Demand

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
On-Demand


On September 15th, 2022, Uber discovered a significant data breach that reportedly stemmed from poor adherence to Identity Security best practices. Per early reporting, several steps in the attack chain exploited poor Identity Security hygiene, including a workforce identity falling for a social engineering attempt, compromise of hardcoded administrative credentials, sparse MFA enforcement and a lack of least privilege.

Watch CyberArk’s Incident Response and Customer Success Strategy teams discuss the lessons learned for CyberArk customers and partners.

Topics include:

  • CyberArk’s dissection of the attack flow
  • Practical steps you can take today to mitigate risk
  • The importance of a security-first, defense-in-depth approach to Identity Security


Presenters:

Bryan Murphy

Sr. Director of Consulting Services and Incident Response, CyberArk

Bryan Murphy partners with CISO's and CIO's to build a strong identity security program that does not slow down the business. Having worked in security for over fifteen years, Bryan uses incident experiences to help clients develop the right controls that not only secure the business, but are user friendly too. Often times executive express concern with choosing between efficiency and security. Bryan brings unique perspective on this challenge and helps organizations to be more secure while minimizing overhead to businesses. Bryan holds CISSP and GCIH certifications.

James Creamer

Customer Success Strategy & Content Architect, CyberArk

James Creamer is the Success & Strategy Content at CyberArk and one of the co-authors of the CyberArk Blueprint for Identity Security Success. He has an extensive background in helping enterprises to deploy CyberArk’s identity security solutions, not just from a technology standpoint, but from a people and process perspective as well. He has worked with countless customers to roll out identity security controls, many across their global enterprises, helping them in prioritize use cases, understanding their current risk posture and developing meaningful identity security program roadmaps. Now it’s his role to help empower all customers to be able to do the same on their own.


WATCH NOW

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.