Putting the privilege back into access management

How hard can it be?


Putting-the-privilege-back-into-access-management

Passwords. Everyone hates them, right?

If you think that strings of upper and lower case characters, numerals and punctuation marks are annoying, spare a thought for the security and systems engineers who spend their days dealing with password-related breaches.

So often, these can start off as relatively innocuous and straightforward password hacks, such as an email password breach. But outside attackers or malicious insiders can exploit serial vulnerabilities, taking compromised email accounts into a full-blown breach of network security.

In this context, privileged accounts can be the difference between a simple network breach and a cyber catastrophe. When a single system is compromised, it is usually easier to mitigate, isolate, and eradicate the risk and restore control.

When a privileged account is breached, it can lead to a major disaster, not least because it allows the attacker to impersonate a trusted employee or system and carry out malicious activity, without being detected as an intruder. Once attackers compromise a privileged account, they can roam at will through the IT environment.

In this webinar, we speak to privileged access management vendor Thycotic about new research, showing how much of a challenge privileged account management is for enterprises of all shapes and sizes. We look at the anatomy of a privileged account hack, showing how cybercriminals target their victims.

Most importantly, we look at what’s driving the challenges, and alongside potential tools and technologies, we consider what you can do to reduce your risk and prevent abuse of your critical information.

So, if you’re looking at how to manage accounts on a by-privilege basis, or you simply want to get your head around how to slay your access management demons and don’t know where to start, tune in.

You will have to register, or log in, in order to watch this event.

 

 

Biting the hand that feeds IT © 1998–2018