Anatomy of a Privileged Account Hack: Know the Risks and Keep them Contained

Logo
Presented by

Joseph Carson, Chief Security Scientist at Thycotic (Delinea

About this talk

Privileged accounts abound in every organization. Failure to manage them leads to significant risk, especially for organizations that use Active Directory and have grown to a level of 1,000 employees or more and service accounts can no longer be managed manually. Almost all large organizations suffer from extreme service account sprawl, perpetuating the unmanaged, uncontrolled expansion of their privileged account attack surface. A compromised privileged account can be the difference between a simple network breach and a cyber catastrophe. Join ThycoticCentrify's (now Delinea) Chief Security Scientist, Joseph Carson, to understand the anatomy of a Privileged Account hack, what the risks are and how to keep them contained. What will you learn? - Which common tools and techniques cyber criminals use to compromise privileged credentials and elevate access. - The current best methods used to reduce the risk of a privileged account attack. Get the answers to these important questions - How easy is it to hack most privileged accounts? - How is a hacked account used to elevate privileges and move laterally across my network? - What methods do attackers use to quickly make their way to my critical systems?

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (19)
Subscribers (736)
Delinea (formerly ThycoticCentrify) is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.