Make Privileged Access Admin Work and Block Lateral Movement by Attackers

Logo
Presented by

Moderator: Dan Raywood - Speakers: Brian Hanrahan, Andy Smith, David Higgins

About this talk

Compromised privileged credentials remain the #1 tool of attackers, despite adoption of privileged access management technology. Legacy approaches focused on protecting secrets have proven ineffective with excessive standing privilege leaving a clear path for lateral movement when a user is compromised. In this webinar, we will challenge your assumptions about privileged access management and describe a simpler, more effective approach to PAM built on best practices. Key takeaways: •Understand how privileged access is used by attackers, and how to foil attempts •What a Just In Time approach looks like and the concept of Zero Standing Privileges (ZSP) •How to make privileged access a straightforward element of your security program •How a single elegant approach to PAM can meet the demands of cloud, hybrid cloud and on-premise computing •How Dev-ops and automation solutions can operate within a modern PAM solution
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (599)
Subscribers (44307)
Dedicated to serving the information security community, in person, in print and online.