1 the privileged pathway: securing and auditing privileged accounts using cyberark brandon...

Post on 21-Jan-2016

224 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

The Privileged Pathway:Securing and Auditing Privileged Accounts Using CyberArk

Brandon Traffanstedt

Systems Engineer - Southeast

2

The New Cyber Battleground: Inside Your Network

Over 90% of organizations have been breached

• Strategic shift from “I can stop everything at the perimeter.” to “I can’t stop anything at the perimeter.”

Information security focus shifts to inside the network

• Proactive protection of critical assets

• Real-time detection of in-progress attacks

Over 38% of breaches are internal – and the most costly

• Need to protect against malicious and accidental insiders

3

Cyber Attacks Are a Daily Event

4

Privileged Accounts: Pathway to Cyber Attacks

“…once they have privileged credentials, they are pretty much home free.” Deloitte, 2014

5

Privileged Accounts - “Keys to the IT Kingdom”

CyberArk Provides Proactive Protection and Detection

ExternalAttackers

MaliciousInsiders

6

Privileged Credentials are Everywhere

WiFi Routers, Smart TVs

Privileged Accounts

Routers, Firewalls, Hypervisors, Databases, Applications

Routers, Firewalls, Servers, Databases, Applications

Laptops, Tablets, Smartphones

Power Plants, Factory Floors

7

Typical Lifecycle of a Cyber AttackPrivilege is At The Center of the Attack Lifecycle

8

CyberArk Breaks the Attack Chain

9

Solving The Privileged Account Security Problem

▪ Control & Accountability forPrivileged Users

▪ Monitor & Record PrivilegedActivity

▪ Compliance Reporting

▪ Remote User Access Control

Audit & Compliance

▪ Advanced, External Threats

▪ Insider Threats

▪ Securing Application Credentials

▪ Securing Shared Admin AccountsThreats

Enterprise Cloud SCADA/ICS

10

10 slides is enough– show us the demo!

11

DNA - Discovery & Audit

Discover where your privileged accounts exist

Clearly assess privileged account security risks

Identify all privileged passwords, SSH keys, and password hashes

Collect reliable and comprehensive audit information

12

Thank you!

Brandon Traffanstedt – Systems Engineer Southeast

(404) 594-2331

Brandon.Traffanstedt@cyberark.com

top related