
Targeted vs. Automated Account Takeover Attacks
Account takeover can be highly-targeted, sophisticated, and manual, or it can be high-volume and automated. Learn how to protect your enterprise from both types of ATO.
WEBINAR
Security Leaders Offer Real-World Advice for Stronger Breach Prevention and Response
“We thought we were doing the right things, but it turns out we couldn’t keep up with evolving attacks.”
We recently hosted an in-depth discussion with two seasoned CxOs who have successfully led through worst case scenarios: breaches that exposed customer data.
SpyCloud’s Chip Witt speaks with Harry D. Fox, former CIO of CareFirst BlueCross BlueShield, and Damian Taylor, former CISO of Landry’s, about the impact of recent breaches and how the companies responded and remediated.
They share lessons learn on:
It’s a rare peek into the aftermath of data breaches from the C-suite that’ll help you better prepare your own prevention and response plans.
Landry’s 60 brands include seafood and steak restaurants like Morton’s and McCormick & Schmick’s, as well as Golden Nugget hotels and casinos. Of their 600 properties, 350 were affected by a malware attack designed to steal cardholder names, card numbers, expiration dates, and verification codes. Learn more here.
Surviving a Data Breach
Damian Taylor, Former CISO of Landry’s
Damian is a computer science and information security expert, a retired U.S. Naval Officer, and currently serves as the Senior IT Specialist for the United States Postal Service Office of the Inspector General. Prior his current role, he served as the Chief Information Security Officer for Landry’s, Inc. and Fertitta Entertainment (parent company of the Houston Rockets).
Damian’s information security career stretches back 20+ years as he’s served in multiple IT security roles throughout the Department of Defense with a focus on national security, information privacy, computer network defense, penetration testing, compliance, cybersecurity policy & strategy development.
Damian has a M.S. in Information Technology Management with a concentration in IT Security, CIO and CISO graduate certificates from National Defense University and a graduate certificate in Advanced Computer Security from Stanford University. He has taught IT Security courses as an adjunct professor and spoken at multiple IT Security focused events.
Harry D. Fox, Former CIO of CareFirst
Harry Fox is currently a Principal at Oak Advisor’s Group, a strategic advisory firm focusing on the intersection of information technology and healthcare.
Harry was the Executive Vice President, Chief Information Officer and Shared Services Executive at CareFirst Blue Cross Blue Shield from 2011 to mid-2018. CareFirst is a $9.0 billion not-for-profit health care company offering a comprehensive portfolio of health insurance products and administrative services to 3.2 million individuals and groups in Maryland, the District of Columbia, and Northern Virginia. Harry was the most senior out executive at CareFirst and was the Executive Sponsor for ProPride, CareFirst’s LGBTQ Associate Resource Group.
Harry has also held senior-level positions at Kaiser Permanente, Coventry Health Care (now Aetna), and PricewaterhouseCoopers, and serves on the boards of multiple private equity-backed companies and not-for-profit organizations.
Harry is a graduate of the Wharton School, where he received an M.B.A. in finance.
Chip Witt, Vice President of Product Management
Chip Witt has nearly twenty years of diverse technology experience, including product management and operations leadership roles at Hewlett Packard Enterprise, Webroot, VMware, Alcatel, and Appthority. He is currently the VP of Product Management at SpyCloud, where he drives the company’s product vision and roadmap. Chip works closely with field intelligence teams specializing in OSINT and HUMINT tradecraft, actor attribution and underground monitoring.
SpyCloud provides early detection of potentially compromised accounts – those using credentials that have appeared in a third-party breach and are therefore at risk of account takeover. And we automate the remediation of exposed passwords, enabling enterprises to lock down accounts quickly, before damage is done.
Our goal is to help organizations to protect themselves from criminal activity and disrupt criminals’ ability to profit from stolen data.
Account takeover can be highly-targeted, sophisticated, and manual, or it can be high-volume and automated. Learn how to protect your enterprise from both types of ATO.
If your account takeover prevention program primarily focuses on automated credential stuffing attacks, you may be leaving your organization exposed to serious losses. Learn more in this webinar we hosted with ISMG.
You can’t stop ATO until you understand it. Get this plain-English primer on the latest attack methods, bad habits that increase ATO risk, and strategies for prevention.
See your real-time breach exposure details powered by SpyCloud data.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
We use analytics data to make site improvements that positively affect our customer's online experience.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.