Some cyberattacks are designed for the quick hit and a quick buck – think ransomware. Others are designed to emphasize stealth, sitting quietly and leaking confidential data while it burrows through the network, often using legitimate credentials of regular users and privileged accounts.

According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover.

This 20/20 webcast looks at how CISOs can gain the upper hand over these attacks by combining granular access control with automated attack detection.