Troy Hunt on ATO: Account Takeovers as the Hidden Threat

In this webinar, Abnormal CISO Mike Britton is joined by Troy Hunt, an expert in compromised credentials and the brains behind HaveIBeenPwned.com, to examine account takeover attacks.

In 2021, compromised credentials were responsible for 20% of all data breaches, making them the most common initial attack vector. Even worse, it takes an average of 250 days to realize that the compromise has even occurred and another 91 days to contain the breach.

With the average cost of a data breach being $4.35 million, it’s clear how large of a threat account takeovers pose to organizations and their employees.

In this webinar, Abnormal CISO Mike Britton is joined by Troy Hunt, an expert in compromised credentials and the brains behind HaveIBeenPwned.com, to examine account takeover attacks. Mike and Troy discuss:

  • How account takeovers occur, both for individuals and organizations

  • What cybercriminals can do once they gain access to even one email account

  • Why the number of compromises continues to grow, despite increased security measures

  • What you can do to prevent your organization from becoming a victim of the next data breach


Complete the form to watch the recording and learn how to protect your organization from account takeovers.

After viewing this webinar, you are eligible for 1 CPE credit through (ISC)²

Troy Hunt on ATO: Account Takeovers as the Hidden Threat

Watch Now

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Resources

B Account Takeover 08 22 22
Even one successful compromised account can start a cascade of other internal and external attacks, making it possibly the most dangerous email threat organizations face.
Download Now
Healthcare ato cover
For cybercriminals, penetrating a healthcare organization is like striking gold. Provider and payer professionals have access to some of the highest-value data in the world, including patients’ personal details, medical histories, social security numbers, insurance information, and more.
Watch Now
Threat report 2
Attackers are leveraging social engineering to drive significantly higher engagement and account takeover. In the Q2 2021 threat report, Abnormal found that attacks are growing at significant rates, as threat actors leverage social engineering strategies to bypass SEGs and drive engagement.
Download Now