The Fundamentals of Protecting your Paths to Privilege

Virtual

Despite the long standing principles of Least-Privilege and Privilege Access Management (PAM), 90% of organizations experienced at least one identity-related security incident in the past year. Even with the number of security tools in place, attackers are outflanking them through unidentified attack paths. And AI is accelerating and uncovering paths to privilege faster than weโ€™ve ever seen. In this webinar, our panelists will discuss how many organizations still maintain legacy identity platforms and applications, the types of privilege abuse that can (and does) occur and finally the fundamentals for protecting your paths to privilege and why it requires an identity-centric approach.

Insider Risk Working Group

Virtual

Join ATARC's Insider Risk Working Group bi-weekly, Thursday afternoon meeting. For more information on ATARC Working Groups, contact ATARC's Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.

Mastering Zero Trust: Leveraging Network Visibility in Zero Trust Frameworks

To Be Announced

ย  Presents Mastering Zero Trust: Leveraging Network Visibility in Zero Trust Frameworks In partnership withย  December 5th, 2024, 1:30-2:30 PM ETย  1ย CPE Credit Available for this Event*** In the rapidly evolving cybersecurity landscape, Zero Trust (ZT) adoption is more than a buzzword; it's a mandate for federal agencies and a necessity for any organization striving […]

Event Series SCRM Working Group

SCRM Working Group

Virtual

Join ATARCโ€™s SCRM Working Group bi-weekly, Wednesday afternoon meeting. For more information on ATARC Working Groups, contact our Working Group Team atย workinggroups@atarc.org.