Identity is becoming a new perimeter and it is crucial to prepare strategies for its security
A hacker does not need to exploit a sophisticated vulnerability. But all he has to do is steal his identity and log in. The greater the rights, the greater the damage.
We will show the Zero Trust model and effective protection of the identity of IT users and system administrators.
We will show the Zero Trust model and effective protection of the identity of IT users and system administrators.
Sign in to ITAPA Health&Care 2025
Daniel Hetényi
Daniel Hetényi helps major organizations protect themselves against IT attacks, improve operational efficiency, and undergo digital transformation safely. He has been working in IT security for 20 years and has been leading the CyberArk regional office for the last 7 years.
See more info about the speaker