Live Hack: Securing Privileged Access to Stop Attackers in Their Tracks

Logo
Presented by

Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic

About this talk

See why endpoints are the favored targets of attackers in this live hack simulation and how cyber criminals use compromised credentials to escalate privileges and access your cloud applications. Join Thycotic Chief Security Scientist Joseph Carson as he demonstrates how an attacker captures an employee password on an endpoint, gets hold of an email account, and escalates the exploit to access a critical cloud application—all undetected by typical security controls. Then, see how you can stop these endpoint attacks and protect privileged access to critical cloud applications with PAM security solutions.
Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (924)
Subscribers (70012)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa