Watch the On-Demand Webinar Today
The slides are available to download below and please share any of your questions here.SummaryRansomware-as-a-service has lowered the barrier to entry for cybercriminals to deploy sophisticated attacks and collect cryptocurrency through extortion. The key to success for attacks is the compromise of privileged user accounts that unlock valuable, sensitive data that can be held for ransom. Yet, best practice privilege access management (PAM) is still elusive for companies and government entities of all sizes and levels of security maturity. Expired accounts, unnecessarily elevated privileges, and insider abuse are too common. Just being a little bit bad at PAM can expose you to an increased risk of ransomware attack success.This webinar will focus on easy-to-implement PAM controls that can help you neutralize attacks by:
SpeakersDinesh Jain, Product Management, IBM SecurityDinesh Jain is part of IBM Security division, working with Identity and Access Management (IAM) since 2004. As a domain expert and product manager for Security IAM, Dinesh is responsible for leading product strategy and roadmap for IBM Security Verify product portfolio. In his job role, Dinesh closely works with development, sales, marketing, customers, business partners and analysts for building the right product strategy and making customer deployments successful.Patrick Ancipink, Product Marketing, IBM SecurityPatrick is a senior product marketer with IBM Security and focused on data security and privileged access management. He has over two decades of diverse experience in enterprise software—from global leaders to disruptive start-ups--and works to ensure that customer-centric initiatives are the design point for technology solutions. After completing his education at Yale University, Patrick started his tech career in a mail room in Silicon Valley and found his way to Austin, TX, where he currently lives with his wife in happy denial about becoming empty nesters.