ID Theft , Privileged Access Management , Security Operations

Credential Theft as a Primary Attack Vector - Detect and Respond to Privileged and Service Account Attacks

Credential Theft as a Primary Attack Vector - Detect and Respond to Privileged and Service Account Attacks

Privileged accounts have been at the center of each recent high-profile attack. Moreover, attackers are leveraging privileged credentials as their entry point to high-value systems within the network. This session will explain how hackers that successfully exploit these credentials are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection. With a solid understanding of this well-used method of attack, attendees will learn how to properly secure and manage these powerful credentials. During this session, CyberArk will discuss growing attack trends and what security leaders are doing to protect their organizations from these advanced attacks. CyberArk also will walk through a typical attack that uses privileged accounts and how passwords can be exploited to break down the front door. The session will touch on the growth and prevalence of privileged credentials. We will discuss how to securely store and manage credentials and how to reduce the attack surface - specifically attack surfaces favored by insiders and outsiders with insider credentials. Additionally, this session will review how to detect credential harvesting and blocking future credential-theft attempts, all while maintaining governance and compliance standards.

See Also: Live Webinar | 8 Ways to Tackle the Biggest Access-Related Information Security Challenges in Financial Services

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.