Deconstructing the Twitter Attack: It’s Time to Prioritize PAM

Logo
Presented by

Matt Tarr, principle solutions engineer for CyberArk

About this talk

Same old story. Motivated to cause disruption or by a potential financial gain, attackers follow a tried and true attack path typically starting at the endpoint with phishing. Industry research shows 80% of successful security attacks involve compromised privileged access. In the case of Twitter’s high-profile breach, an insider threat adds another familiar element to the story. With a dramatic increase of remote workers comes an expanded attack surface. Worker today are distracted while juggling work and family responsibilities, and there is increased stress related to a global pandemic and an uncertain economic future. There is not a better time to review the priorities of your security program to ensure policies and practices reflect new realities. Questions every security leader asking right now: how are we identifying what our most critical systems, tools, data and infrastructure are and who has access? Who is considered a privileged user (this includes business users) and what steps are we taking to manage, monitor and protect that access? Join us to learn about security trends and best practices including: • Reasons identity is the new perimeter • Isolating access to the administrative system and requiring dual control for highly sensitive operations • Continuous monitoring and user behavior analysis on applications through a monitored proxy • Implementing least privilege controls to minimize access to sensitive functionality The twitter attack highlights the dangers of unsecured privileged access to critical resources and how quickly any credential or identity can become privileged under certain conditions.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (117)
Subscribers (7630)
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!