How PAM+ Helps Maximize Your Cyber Insurance Coverage

Presented by

Tim Keeler, Co-Founder and CTO of Remediant (now part of Netwrix)

About this talk

The cybersecurity insurance landscape is shifting as cyber attacks, like ransomware and malware, are becoming more sophisticated. We’re confronted with the uncomfortable reality where conventional approaches, such as meeting minimum compliance requirements and sticking to traditional privilege access management strategies, don’t do enough to protect an organization’s data. What’s worse is that only meeting the minimum can create gaps in cyber insurance and drive up premium costs. Cyber insurance companies can have very specific requirements around an organization's current security practices, such as their EDR. To keep premiums down and to stay ahead of nefarious actors, one approach to consider is to adopt quick-to-deploy strategies, such as a more advanced concept of privilege access management called PAM+. It’s an approach that eliminates the impact of compromised admin credentials through Just-in-Time access, renders password-stealing malware ineffective, and delivers rapid time-to-value. Watch this recording to deep dive into: - A brief primer on the current cyber insurance landscape. - How legacy PAM toolsets and approaches meet compliance requirements may not protect against the realized actual risk that cyber insurance providers care about. - Recent case studies illustrate how PAM+ can help protect your organization from attacks involving lateral movement.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (192)
Subscribers (5681)
Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach. Our solutions also limit the impact of attacks by helping IT teams detect, respond and recover from them faster and with less effort. Over 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.