Upload
britney-wells
View
230
Download
1
Tags:
Embed Size (px)
Citation preview
1
The Privileged Pathway:Securing and Auditing Privileged Accounts Using CyberArk
Brandon Traffanstedt
Systems Engineer - Southeast
2
The New Cyber Battleground: Inside Your Network
Over 90% of organizations have been breached
• Strategic shift from “I can stop everything at the perimeter.” to “I can’t stop anything at the perimeter.”
Information security focus shifts to inside the network
• Proactive protection of critical assets
• Real-time detection of in-progress attacks
Over 38% of breaches are internal – and the most costly
• Need to protect against malicious and accidental insiders
3
Cyber Attacks Are a Daily Event
4
Privileged Accounts: Pathway to Cyber Attacks
“…once they have privileged credentials, they are pretty much home free.” Deloitte, 2014
5
Privileged Accounts - “Keys to the IT Kingdom”
CyberArk Provides Proactive Protection and Detection
ExternalAttackers
MaliciousInsiders
6
Privileged Credentials are Everywhere
WiFi Routers, Smart TVs
Privileged Accounts
Routers, Firewalls, Hypervisors, Databases, Applications
Routers, Firewalls, Servers, Databases, Applications
Laptops, Tablets, Smartphones
Power Plants, Factory Floors
7
Typical Lifecycle of a Cyber AttackPrivilege is At The Center of the Attack Lifecycle
8
CyberArk Breaks the Attack Chain
9
Solving The Privileged Account Security Problem
▪ Control & Accountability forPrivileged Users
▪ Monitor & Record PrivilegedActivity
▪ Compliance Reporting
▪ Remote User Access Control
Audit & Compliance
▪ Advanced, External Threats
▪ Insider Threats
▪ Securing Application Credentials
▪ Securing Shared Admin AccountsThreats
Enterprise Cloud SCADA/ICS
10
10 slides is enough– show us the demo!
11
DNA - Discovery & Audit
Discover where your privileged accounts exist
Clearly assess privileged account security risks
Identify all privileged passwords, SSH keys, and password hashes
Collect reliable and comprehensive audit information