Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Thursday, July 1st  | 3:00 PM (EDT) / 15:00 (CET) / 11:30 AM (SGT)

A Toolset to Fend Off Advanced Malware Attacks


Take a closer look at the mitigation tools used by the ‘Blue Team’ to fend off the multiple attack scenarios played out in our Attack & Defend (A&D) Virtual War Room Experience.

In this third instalment in The Endpoint Threat webinar series, we will spend 30 minute’s reviewing the underlying tooling capabilities demonstrated in the A&D simulation. The combination of preventive and detection controls and tools are an integral part to any Defense-in-Depth security strategy – blocking in-play attacks or making it so difficult to traverse through the network that an attacker becomes easily detectable.

We will break down specific tools to: 

  • Enforce the Principle of Least Privilege – Removing standing admin rights to impede a would-be attacker and limit the risk of a compromised endpoint 
  • Implement Application Control – Enabling the workforce whilst preventing malicious processes from running
  • Proactively Block Credential Theft Attempts – Ensuring only approved processes can access credential caches 
  • Deceive Threat Actors through Privilege Deception – Leveraging Privilege lures to notify Security Teams of in-play attacks
  • Combine Endpoint Protection Tooling with a wider Defense-in-Depth Security Strategy – Integrating other controls and capabilities.

REGISTER NOW
Date: Thursday July 1st
Time: 3:00 PM (EDT) / 3:00 PM (CET) / 11:30 AM (SGT)
Running time: 30 mins + Q&A

Presenters:
  • David Higgins, Technical Director, CyberArk
  • Brandon Traffanstedt, Sr Director, Global Technology Office, CyberArk

REGISTER NOW

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.