The modern threat environment continues to evolve, with automation, the move to the cloud, software as a service, AI, new user expectations and increasingly sophisticated attacks from threat actors. How do we cope with those changes today - and the certainty that there will be new challenges tomorrow?
We do so by addressing the fundamentals of attack that don't change: Attackers use deception, steal identities and escalate privileges until they reach their target - and we evolve our defenses in line with the changed context.
"We can't secure everything on day one. We need a risk-based access approach. We need to categorize the access use cases and secure the highest-risk access first, said David Higgins, EMEA technical director, CyberArk.
In this interview with Information Security Media Group, Higgins also discusses:
-How to address the main challenges faced by defenders today;
-What our strategy needs to be in order to cope with tomorrow's unknown threats;
-How ID has played a key role in security and will continue to do so.
Since joining CyberArk in 2010, Higgins has worked to help the world's leading - and most complex - organizations to secure and protect their privileged access. Today, he advises clients on threats associated with privileged escalation, lateral movement and credential theft and discusses best practices and driving innovation around privileged management processes.