InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How PAM Tackles Accelerated Change in the Threat Landscape

Presented by

David Higgins

About this talk

The modern threat environment continues to evolve, with automation, the move to the cloud, software as a service, AI, new user expectations and increasingly sophisticated attacks from threat actors. How do we cope with those changes today - and the certainty that there will be new challenges tomorrow? We do so by addressing the fundamentals of attack that don't change: Attackers use deception, steal identities and escalate privileges until they reach their target - and we evolve our defenses in line with the changed context. "We can't secure everything on day one. We need a risk-based access approach. We need to categorize the access use cases and secure the highest-risk access first, said David Higgins, EMEA technical director, CyberArk. In this interview with Information Security Media Group, Higgins also discusses: -How to address the main challenges faced by defenders today; -What our strategy needs to be in order to cope with tomorrow's unknown threats; -How ID has played a key role in security and will continue to do so. Since joining CyberArk in 2010, Higgins has worked to help the world's leading - and most complex - organizations to secure and protect their privileged access. Today, he advises clients on threats associated with privileged escalation, lateral movement and credential theft and discusses best practices and driving innovation around privileged management processes.
CyberArk

CyberArk

44403 subscribers208 talks
Don’t just manage identities. Secure them.
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.
Related topics