Mitigate Your Risk with Six Steps and New CyberArk HAR Tool

Logo
Presented by

Andy Thompson, Khizar Sultan

About this talk

Okta's support case management system was breached by a threat actor using stolen credentials. Watch as CyberArk resident experts, Khizar Sultan and Andy Thompson, deconstruct the events of this breach and share strategies organizations can take to mitigate the risks of identity attacks using strong security processes and operational procedures.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (41)
Subscribers (2750)
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.