Access Management , ID Fraud , Privileged Access Management
Credential Theft as a Primary Attack Vector - Detect and Respond to Privileged and Service Account Attacks
Privileged accounts have been at the center of each recent high-profile attack. Moreover, attackers are leveraging privileged credentials as their entry point to high-value systems within the network. This session will explain how hackers that successfully exploit these credentials are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection. With a solid understanding of this well-used method of attack, attendees will learn how to properly secure and manage these powerful credentials. During this session, CyberArk will discuss growing attack trends and what security leaders are doing to protect their organizations from these advanced attacks. CyberArk also will walk through a typical attack that uses privileged accounts and how passwords can be exploited to break down the front door. The session will touch on the growth and prevalence of privileged credentials. We will discuss how to securely store and manage credentials and how to reduce the attack surface - specifically attack surfaces favored by insiders and outsiders with insider credentials. Additionally, this session will review how to detect credential harvesting and blocking future credential-theft attempts, all while maintaining governance and compliance standards.
See Also: Advancing Zero Trust with Privileged Access Management (PAM)