COVID-19, Incident Response & Standing Privilege: Where's the Easy Button?
Tom Kellermann, Head of Cybersecurity Strategy from VMware Carbon Black and JD Sherry, CRO from Remediant
Cyber security investigators, data breach analysis reports, and security professionals continue to confirm that lateral movement (enabled by user profile propagation), and the abuse of standing privileges remain at the center of most major incidents. Unfortunately, it's also one of the most complex cyber security challenges to solve. As a result, privileged access security controls…