Supporting Programme 2019
Thycotic/ALSO - Privileged Access Management (PAM) and why traditional perimeter security is not enough
Examining cyber breaches in the past years, public reports describe that up to 80 percent of these incidents involve the compromise of passwords or other identity credentials. When our identities are stolen or unknowingly exposed, any attacker can easily bypass traditional perimeter security barriers undetected. And if that identity has access to privileged accounts, hackers can quickly get at critical information assets. Unfortunately, many IT users lack a full understanding of how privileged accounts function, and how they fit as a key component into the anatomy of a typical breach. That makes IT teams and their organizations much more vulnerable to potential monetary and reputational damage from increasing cyber threats. This presentation describes the “Anatomy of a Privileged Account Hack.” It explains how outside attackers or malicious insiders can exploit vulnerabilities using examples such as a compromised email account password that escalates into a full-blown breach of network security.
--- Date: 09.10.2019 Time: 14:45 - 15:00 Location: Forum 9