Privileged Accounts and the Cyber Attack Life Cycle

Logo
Presented by

Adam Bosnian, EVP, Global Business Dev, CyberArk, Milan Gavran, TAP Sales Mgr, FireEye

About this talk

Mandiant Consulting’s 2016 M-Trends report once again shows that cyber attacks follow a regular pattern of crashing through perimeter defenses, obtaining a credential and then using the acquired access to move laterally throughout the network and escalate privileges to complete their primary objective. Once attackers obtain privileged credentials, they can slowly gain control of the entire organization’s IT environment. This session will focus on how attackers find their way to the heart of enterprises, the role privileged credentials (passwords and SSH keys) play in an active cyber attack, and how the integration of CyberArk Privileged Account Security Solution and the FireEye Threat Analytics Platform (TAP) can help organizations detect, alert and rapidly respond to cyber attacks. The audience will be walked through a few data breach examples and shown how combining intel from both systems is used to assist in detection and response acceleration. Attendees can expect to gain an advanced understanding of how they can start leveraging their enterprise-wide data and privileged threat analytics to quickly identify and disrupt the most critical in-progress attacks. Register today.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (425)
Subscribers (119123)
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.