PRIVILEGED ACCOUNT ABUSE

Slides:



Advertisements
Similar presentations
BalaBit Shell Control Box
Advertisements

Privileged Identity Management Enterprise Password Vault
Audit Issues regarding Passwords on Elevated Privilege Accounts Gene Scheckel Global Internal Audit.
Random Password Manager Centralized scalable password management security and recovery Joe Vachon Sales Engineer.
© 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And Session Recording A Partnership with IBM and ObserveIT.
Privileged Account Management Jason Fehrenbach, Product Manager.
USER ACTIVITY MONITORING: YOUR MISSING SECURITY VANTAGE POINT Presented by Matt Zanderigo.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Active Directory Production Pilot Project Department of Administration Enterprise Technology Services (ETS) ETS is a customer based team that provides.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Single Identity – Multiple services how do I stay compliant? Wade Tongen NA Commercial SE.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Website Hardening HUIT IT Security | Sep
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Presenter: Nick Cavalancia Auditing Evangelist 3 Ways Auditing Needs to be a Part of Your Security Strategy Brought to You by.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Dell Connected Security Solutions Simplify & unify.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Brandon Traffanstedt Systems Engineer - Southeast
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
David C. Brown, CISSP, PMP, CEH IUP Information Assurance Day 2011 November 10, 2011 Four Essential Requirements for Securing Your Enterprise.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Locking down privileged accounts
Defining your requirements for a successful security (and compliance
Protect your Digital Enterprise
Stopping Attacks Before They Stop Business
Microsoft 365 Security and Compliance: Training and Resources
Deployment Planning Services
Six Steps to Secure Access for Privileged Insiders and Vendors
Michael Menne IT Solutions Chief Information Security Officer
Comprehensive Security and Compliance at an Affordable Price.
Enterprise-level Identity Protection
Data Architecture World Class Operations - Impact Workshop.
Compliance with hardening standards
Microsoft /20/2018 9:26 AM BRK1037 Win the IT security battle: automate password changes, privileged access & Minimize Cyber Losses Christopher.
Six Steps to Secure Access for Privileged Insiders and Vendors
#ISUCIT.
Speaker’s Name, SAP Month 00, 2017
Secure & Unified Identity
BOMGAR REMOTE SUPPORT Karl Lankford
Introduction to Soonr by ….
Office 365 Security Assessment Workshop
Company Overview & Strategy
Varonis Overview.

We are a global leader of next-generation IT security solutions that protect organizations against cyber-attacks that use privileged accounts to strike.
Offices: DC, London, Sydney
Brandon Traffanstedt Systems Engineer - Southeast
12/10/ :45 AM BRK3087 Azure SQL Database: The world's first intelligent cloud database service Ron Matchoro & Veljko Vasic : SQL Product Team Frans.
A 5-minute overview of ADAudit Plus
Protecting your data with Azure AD
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Presentation slide for courses, classes, lectures et al.
Navigating GP Security
The MobileIron® Threat Detection difference:
No!. [NEXT SLIDE] LOGO HERE.
Information Protection
Privileged Access Management
STEALTHbits Technologies, Inc.
Information Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

PRIVILEGED ACCOUNT ABUSE Why it’s your #1 security threat and how you can stop it today.

Introduction Standard speaker slide Headshot Name/Title

Offices: DC, London, Sydney Founded in 1996 Offices: DC, London, Sydney

47 of the Fortune 500 including: Thycotic eliminates privileged account abuse for more than 3,000 organizations world-wide. 47 of the Fortune 500 including: Our security tools vault and securely manage privileged account credentials while monitoring the users accessing them daily.

Why is privileged account abuse so relevant in today’s data breaches?

Play insider threat video The obligatory Snowden slide. Whether you agree or disagree with his politics, Snowden has certainly raised awareness to the insider threat problem. Just how relevant is Insider Threat to companies today?

Human Accounts Accounts Non-Human VS Service accounts Unix ROOT Windows Local Admin Tied to an end-user Active Directory LDAP accounts People accounts -AD -LDAP Non-People Accounts -Service accounts -Windows local admin -Unix root -CISCO enable

Global Data Breach Landscape: 2013 - 2014 2014 Verizon Data Breach investigations report 50 contributing organizations 1,367 data breaches 63,437 incidents on record Spanning 95 countries Source: 2014 Verizon Data Breach Investigations Report

RISK ASSESSMENT Are you following SANS CSC recommendations per the DBIR?

SANS CSC: Quick Wins Provide solid risk reduction without major procedural, architectural, or technical changes to an environment Provide such substantial and immediate risk reduction against very common attacks that most security-aware organizations prioritize these key controls. Source: SANS CSC Controls – website definitions

Vault Credentials

Discover Inventory Audit

Rotate Passwords

Monitor Admins Monitor Activity

Thycotic Secret Server: Eliminates Privileged Account abuse for global organizations. Securely vaults and centralizes privileged credentials for IT. Automatically rotates strong passwords on non-human privileged accounts (Unix, Windows Local Admin, Service Accounts, Database Admin Accounts). Monitors privileged user activity through session recording, keylogging and live session monitoring. Produces custom reports for auditing and compliance mandates such as PCI, SOX and HIPAA.

Why do organizations choose Thycotic? Largest Privileged Account Management provider: 3,000+ global customers. Rated #1 in customer satisfaction by Forrester Research. The #1 adoption rate with 180,000+ users world-wide. Fastest enterprise-class PAM tool to install: all software, no appliance. Deploys in hours, not months. Immediate ROI eliminating password and privileged account abuse from Day 1.

Questions? Questions?