Achieve Compliance/Insurance by Securing Privileged Credentials
- Tues: 1:30 – 2pm
- Wed: 10:30 – 11:00am, 3:00 – 3:30pm
- Thurs: 11:30 – 12:00pm
|
In today's rapidly evolving digital landscape, ensuring compliance is challenging for organizations of all sizes. This presentation delves into the critical role of an enterprise-grade vault in simplifying proof of compliance. We'll explore how Secret Server not only secures your sensitive credentials but also ensures compliance with stringent regulatory standards. Through real-world scenarios and best practices, learn how to leverage Secret Server to meet compliance requirements while building resilience, improving efficiency, and increasing profitability. |
Mitigate Privilege Risks of MITRE ATT&CK Techniques
- Tues: 2:00 – 2:30pm
- Wed: 11:00 – 11:30am
- Thurs: 12:00 – 12:30pm
|
Navigate the complexities of cyber threats using the MITRE ATT&CK framework. This presentation offers an exploration of how the framework provides a comprehensive and actionable guide to understanding and mitigating cyber threats. We'll demonstrate how leveraging the MITRE ATT&CK framework empowers organizational defenders to enhance their security posture, develop robust defense strategies, and stay one step ahead of adversaries. Join us to unlock the full potential of the MITRE ATT&CK framework in fortifying your cybersecurity defenses. |
Reduce Risks from Remote Access
- Tues: 12:00 – 12:30pm, 5:00 – 5:30pm
- Wed: 12:00 – 12:30pm
- Thurs: 11:00 – 11:30am
|
Dive into securing third-party remote access in a decentralized work landscape, moving beyond the outdated VPN model fraught with security and compliance pitfalls. We'll showcase Delinea's platform, demonstrating how identity verification, precise access control, secure connections, and diligent auditing can fortify your network against external threats. Learn how to streamline vendor access without compromising on security, ensuring your network remains robust and resilient. |
Reducing Risks from Misconfigured Cloud Privileges
- Tues: 10:00 – 10:30am, 3:00 – 3:30pm
- Wed: 3:30 – 4:00pm
|
IT complexity and the sprawl of identities is challenging legacy IAM and cloud service providers that don't have visibility into identities across cloud infrastructures, like AWS, Azure and GCP. This leads to misconfigured or over-privileged cloud privileges for accounts lacking MFA, stale accounts, etc. Too much privilege leads to higher IT workload, risk of breach, data loss, and ransomware. Join us to see how Delinea helps you – continuously monitor and discover across multi-cloud frameworks to control your cloud infrastructure |
Achieve Least Standing Privileges with Just-in-time Privilege Elevation
- Tues: 2:30 – 3:00pm
- Wed: 11:30 – 12:00pm, 3:30 – 4:00pm
|
Unlock the power of Just-in-time and just enough privilege for server security in this enlightening presentation. We'll dive into the critical importance of implementing least privilege through privilege control on servers, a cornerstone for safeguarding your organization's most vital assets. Discover how enforcing access rights not only minimizes the attack surface but also significantly reduces the risk of internal and external threats. Through practical insights and best practices, learn how to effectively manage privilege controls to ensure your servers are secure, compliant, and resilient against today's sophisticated cyber threats. |
Mitigate Ransomware Attacks with PAM
- Tues: 11:00 – 11:30am, 3:30 – 4:00pm
- Wed: 2:00 – 2:30pm
- Thurs: 12;30 – 1:00pm
|
Cyber criminals have shifted their tactics, emphasizing data exfiltration alongside traditional encryption payloads. Rather than solely encrypting data, they strategically extract sensitive information. The battle against ransomware now demands a comprehensive and multi-layered defense strategy. Organizations need to adopt proactive measures to detect, mitigate, and prevent ransomware attacks. Join us to gain insights into how to empower your organizations to make informed choices in your own security program to address the shifting ransomware landscape. |
Risks from Over-Privileged Users on Workstations
- Tues: 1:00 – 1:30pm
- Wed: 12:30 – 1:00pm
|
Explore the significant security risks posed by over-privileged users on workstations, including increased vulnerability to breaches and non-compliance issues. We will discuss implementing the principle of least privilege, automating privilege management, and monitoring privileged activities as key strategies for mitigating these risks. The session includes a practical demonstration of Delinea's solutions for effective privileged access management, demonstrating how organizations can enhance their security framework against overprivileged user threats. |
Discover Identity Threats & Risks
- Tues: 11:30 – 12:00pm, 4:00 – 4:30pm
- Wed: 2:30 – 3:00pm
- Thurs: 1:00 – 1:30pm
|
The rise of cloud, particularly cloud service providers like Google, AWS and Azure have changed the IT and security landscape. But they have left dangerous consequences many tools are ill equipped to handle. Network monitoring, application and endpoint protection are all increasingly less effective in this new paradigm, because in our "everything as a service" environment, we lack the tools to gain visibilty across our IaaS, SaaS and IdP platforms. This leads to over privileged and non-used accounts sitting there waiting to be taken over. Join us to learn how you can better protect your organization with Identity threat detection and response (ITDR) |
How Can Organizations Manage the Growing Complexity of Identities, Data, and Applications?
- Tues: 12:00 – 12:30pm, 4:30 – 5:00pm
- Wed: 1:00 – 1:30pm, 4:00 – 4:30pm
- Thurs: 10:30 – 11:00am
|
As organizations navigate the proliferation of identities, applications, and data, they encounter complex security challenges that compromise their security posture. This presentation will discuss how poor identity lifecycle management (ILM) practices and lack of governance can expose organizations to risks. We will explore strategic approaches to managing the identity lifecycle and access with a risk-based approach. Highlighting the benefits of an identity-centric approach, we will demonstrate how automation and continuous monitoring can bolster security across an organization's digital landscape. |