12
1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

Embed Size (px)

Citation preview

Page 1: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

1

The Privileged Pathway:Securing and Auditing Privileged Accounts Using CyberArk

Brandon Traffanstedt

Systems Engineer - Southeast

Page 2: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

2

The New Cyber Battleground: Inside Your Network

Over 90% of organizations have been breached

• Strategic shift from “I can stop everything at the perimeter.” to “I can’t stop anything at the perimeter.”

Information security focus shifts to inside the network

• Proactive protection of critical assets

• Real-time detection of in-progress attacks

Over 38% of breaches are internal – and the most costly

• Need to protect against malicious and accidental insiders

Page 3: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

3

Cyber Attacks Are a Daily Event

Page 4: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

4

Privileged Accounts: Pathway to Cyber Attacks

“…once they have privileged credentials, they are pretty much home free.” Deloitte, 2014

Page 5: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

5

Privileged Accounts - “Keys to the IT Kingdom”

CyberArk Provides Proactive Protection and Detection

ExternalAttackers

MaliciousInsiders

Page 6: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

6

Privileged Credentials are Everywhere

WiFi Routers, Smart TVs

Privileged Accounts

Routers, Firewalls, Hypervisors, Databases, Applications

Routers, Firewalls, Servers, Databases, Applications

Laptops, Tablets, Smartphones

Power Plants, Factory Floors

Page 7: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

7

Typical Lifecycle of a Cyber AttackPrivilege is At The Center of the Attack Lifecycle

Page 8: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

8

CyberArk Breaks the Attack Chain

Page 9: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

9

Solving The Privileged Account Security Problem

▪ Control & Accountability forPrivileged Users

▪ Monitor & Record PrivilegedActivity

▪ Compliance Reporting

▪ Remote User Access Control

Audit & Compliance

▪ Advanced, External Threats

▪ Insider Threats

▪ Securing Application Credentials

▪ Securing Shared Admin AccountsThreats

Enterprise Cloud SCADA/ICS

Page 10: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

10

10 slides is enough– show us the demo!

Page 11: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

11

DNA - Discovery & Audit

Discover where your privileged accounts exist

Clearly assess privileged account security risks

Identify all privileged passwords, SSH keys, and password hashes

Collect reliable and comprehensive audit information

Page 12: 1 The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

12

Thank you!

Brandon Traffanstedt – Systems Engineer Southeast

(404) 594-2331

[email protected]