Changing the Conversation About Privileged AccessScott Walker of Bomgar on New Ways to Prioritize Access Management
Recent research from Forrester finds that 80 percent of breaches involve the exploitation of privileged access. Several high-profile breaches, including those affecting Anthem, Sony and Home Depot, are examples of incidents where a criminal took advantage of privileged credentials to illegally gain access to a corporate system.
See Also: Threat Intelligence - Hype or Hope?
Managing privileged access is a much bigger and more complex job today than it was even just a few years ago, says Scott Walker, a Solutions Engineer (EMEA) at Bomgar Corp., who advises security professionals to be mindful of the components that are at play in employee as well as third-party access as the reliance on vendors continues to grow.
In an interview at Information Security Media Group's recent Fraud and Breach Prevention Summit in London, Walker discusses:
- Why the concerns around privileged access have changed in recent years;
- Tips for addressing the different needs of varying levels of access;
- Thoughts on locking down third-party vendor access.
Walker is a solutions engineer for Bomgar. He formerly worked at Kaspersky Lab and has a decade of experience in the field.