Video: Augmenting Threat Detection and Securing Workforce Identities
In October 2022, InfoTrust hosted the "Augmenting Threat Detection and Securing Workforce Identities" webinar with partner CrowdStrike. 80% of cyberattacks leverage identity-based techniques to compromise legitimate credentials and gain access to an organisation's network. Upon access, cybercriminals quickly move laterally to exfiltrate sensitive data and detonate a major cyber attack.
In this latest session, InfoTrust and CrowdStrike experts discussed:
- Sophisticated attack techniques that utilise compromised credentials
- How to enable accurate threat detection and real-time prevention of identity-based attacks
- How to protect your workforce identities using a unified security approach
To access the recording, fill in the form below
see our
Related resources
In this 45 minute session, InfoTrust and Mimecast email security experts broke down the different types of prevalent email attacks by their tactics and how these can be mitigated.
We looked at the attack chain for;
- Phishing attacks
- Business Email Compromise and Spear Phishing
- Account Takeover Attacks
- Ransomware Attacks
Giving examples of how each tactic evades your traditional security controls, and why next-generation solutions – specifically Secure Email Gateways, are a necessity for businesses.
In December 2019, InfoTrust’s Cyber Defence Team presented with Okta specialists on Zero Trust and how organisations can incorporate it into their security strategy. Our cloud security experts covered;
- What is Zero Trust and where did it come from? More than just a buzzword, a practical security strategy for businesses
- Why is Zero Trust needed as part of a holistic security strategy?
- The Zero Trust maturity curve and how your business can progress through it
- Frequently asked questions by organisations when on the Zero Trust journey
To watch the webinar recording fill out the form below.
In August 2019, InfoTrust’s Cyber Defence Team presented on the advanced threats that we are seeing in the market, and common email security challenges we help our customers solve in their ecosystem.
Richard, John, and Caitlin covered how your organisation can mitigate the risk of;
We're Here To Help