filmov
tv
Morey J. Haber (BeyondTrust): Privileged Attack Vectors: Strategies for protecting your organization
Показать описание
Privilege-based threats continues to evolve, increase in volume and complexity, and test the limits of existing security controls and solution implementations. And today, almost every security breach involves some aspect of privilege/privileged access—whether it be the initial point of compromise, or lateral movement and escalation of privileges once a threat actor has breached the network perimeter, or compromised an endpoint or identity.
Join Morey J Haber, BeyondTrust CTO and CISO, in this presentation, to explore how privileges, insecure credentials— both human and machine, administrative rights, and remote access can be combined as an attack vector to breach any organization. Haber will also share insights from the recently released 2nd edition of his book Privileged Attack Vectors, including:
- Common and emerging threat vectors used in privileged attacks
- How privileged access management (PAM) controls disrupt key stages in the cyber attack chain.
- Top use cases and methodology for deploying a successful universal privilege access management program within an organization
Join Morey J Haber, BeyondTrust CTO and CISO, in this presentation, to explore how privileges, insecure credentials— both human and machine, administrative rights, and remote access can be combined as an attack vector to breach any organization. Haber will also share insights from the recently released 2nd edition of his book Privileged Attack Vectors, including:
- Common and emerging threat vectors used in privileged attacks
- How privileged access management (PAM) controls disrupt key stages in the cyber attack chain.
- Top use cases and methodology for deploying a successful universal privilege access management program within an organization