Gesamtlänge aller Episoden: 5 hours 15 minutes
Listen now and gain critical insight into the security risks posed by local accounts. This session is crucial for any cybersecurity professional looking to bolster their defenses against subtle yet severe threats lurking within their IT environments.
Are you a current cybersecurity professional at manager level or above working for an enterprise organization?
In this episode, we’re unpacking a critical, yet often overlooked aspect of cybersecurity—local accounts on servers, databases, and applications.
While they may seem harmless tucked away in the corners of your IT infrastructure, these local accounts can actually pose a ticking time bomb of risk, threatening the very integrity of an organization...
In this Webinar Session of "Control-Alt-Defeat: Gaming the System of Prioritizing Security Risk," we navigate the treacherous terrain of identity security asset types, controls, and violations with the precision of a grandmaster strategist playing the ultimate game of chess.
Our expert host dives into the art and science of turning sprawling data points into actionable intelligence...
We’re diving deep with Neil Hymowitz from Northwell Health into how healthcare organizations can effectively set and prioritize security controls to protect sensitive data. ????????
Don’t miss out—enhance your security strategy by tuning in now! Plus, register for our live webinar on the 25th for a deeper dive into today’s topics.
https://insights.sphereco...
We’re diving deep with Neil Hymowitz from Northwell Health into how healthcare organizations can effectively set and prioritize security controls to protect sensitive data. ????????
Don’t miss out—enhance your security strategy by tuning in now! Plus, register for our live webinar on the 25th for a deeper dive into today’s topics.
https://insights.sphereco...
March 2024Today, March 21st at 2:00pm ET In today's session of Identity Hygiene Live, where we take a deeper dive into Identity and how it directly impacts your organization's risk posture. Don't miss out on these insights
--- Send in a voice message: https://podcasters.spotify.com/pod/show/identity-hygiene-sphere/message
Identify Your Identities: Bob Smith is not BSmith
Take a deeper dive into Identity and how it directly impacts your organization's risk posture.
--- Send in a voice message: https://podcasters.spotify.com/pod/show/identity-hygiene-sphere/message
In any size organization, identifying individuals and their digital personas—like "Bob Smith" and "bsmith," which could be a CEO or a mailroom clerk, a user account, or an email alias—is crucial.
The complexity of metadata demands we differentiate the actual from the digital for security purposes. After all, while "Bob Smith" might be working at his desk, "bsmith" could be inadvertently granting access to restricted areas...
In any size organization, identifying individuals and their digital personas—like "Bob Smith" and "bsmith," which could be a CEO or a mailroom clerk, a user account, or an email alias—is crucial.
The complexity of metadata demands we differentiate the actual from the digital for security purposes. After all, while "Bob Smith" might be working at his desk, "bsmith" could be inadvertently granting access to restricted areas...