Brandon Traffanstedt Systems Engineer - Southeast

Slides:



Advertisements
Similar presentations
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
Advertisements

SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
1 The New Cyber Battleground: Inside Your Network Chad Froomkin Major Account Executive Southeast.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Website Hardening HUIT IT Security | Sep
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Brandon Traffanstedt Systems Engineer - Southeast
CyberArk Security for the Heart of the Enterprise
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Defining your requirements for a successful security (and compliance
Protect your Digital Enterprise
Stopping Attacks Before They Stop Business
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Maciej Pęciak Robert Dąbroś
Six Steps to Secure Access for Privileged Insiders and Vendors
Cybersecurity - What’s Next? June 2017
Comprehensive Security and Compliance at an Affordable Price.
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Journey to Microsoft Secure Cloud
Real-time protection for web sites and web apps against ATTACKS
Cyber Security: State of the Nation
Evaluating Existing Systems
Microsoft /20/2018 9:26 AM BRK1037 Win the IT security battle: automate password changes, privileged access & Minimize Cyber Losses Christopher.
Introduction to a Security Intelligence Maturity Model
Leverage What’s Out There
Six Steps to Secure Access for Privileged Insiders and Vendors
Evaluating Existing Systems
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Speaker’s Name, SAP Month 00, 2017
NYBA 2017 Technology, Compliance &
Privileged Accounts: Discover / Protect / Monitor
BOMGAR REMOTE SUPPORT Karl Lankford
Transforming IT Management
Call AVG Antivirus Support | Fix Your PC
Company Overview & Strategy
Advanced Services Cyber Security 101 © ABB February, | Slide 1.

Strong Security for Your Weak Link:
cyberopsalliance.com |
PRIVILEGED ACCOUNT ABUSE
Home Internet Vulnerabilities
Check Point Connectra NGX R60
National Cyber Security
NSX Data Center for Security
Threat Monitoring and Defense A fully managed and monitored security and compliance solution for cloud, hybrid, & on-premises infrastructure.
How to address security, cost, IT and migration concerns
Presentation slide for courses, classes, lectures et al.
Cyber Security in a Risk Management Framework
No!. [NEXT SLIDE] LOGO HERE.
Information Protection
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Security intelligence: solving the puzzle for actionable insight
Privileged Access Management
Information Protection
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Brandon Traffanstedt Systems Engineer - Southeast The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

The New Cyber Battleground: Inside Your Network Over 90% of organizations have been breached Strategic shift from “I can stop everything at the perimeter.” to “I can’t stop anything at the perimeter.” Over 38% of breaches are internal – and the most costly Need to protect against malicious and accidental insiders Ponemon – Cost of Cyber Breaches 2012 – “The most costly breaches, including denial of service, malicious insiders and web-based attacks, account for 58% of overall cost of data breaches…Insider attacks can take an average of more than 50 days to contain…. 38% of benchmark organizations suffered attack by malicious insiders 38% of breaches are insiders; accidental insiders another 35%.... Wow – that’s huge – 38% of breaches are insides…accidental is another 35%....so 83% of breaches are from the inside According to a 2012 Ponemon institute study…Insider breaches can take more 50 days to contain!!!! Information security focus shifts to inside the network Proactive protection of critical assets Real-time detection of in-progress attacks

Cyber Attacks Are a Daily Event Web Articles Not a day goes by when we don’t read about another serious breach. And in almost every single instance, privileged accounts are exploited by the attacker… The list from 2012 alone includes…. Flame Saudi Aramco University of Georgia Toyota Subway US Chamber of Commerce State of South Carolina Red October ….I could go on…

Privileged Accounts: Pathway to Cyber Attacks “…once they have privileged credentials, they are pretty much home free.” Deloitte, 2014

Privileged Accounts - “Keys to the IT Kingdom” Malicious Insiders External Attackers CyberArk Provides Proactive Protection and Detection

Privileged Credentials are Everywhere Privileged Accounts Routers, Firewalls, Hypervisors, Databases, Applications Routers, Firewalls, Servers, Databases, Applications Laptops, Tablets, Smartphones Power Plants, Factory Floors WiFi Routers, Smart TVs Where are your privileged accounts? They are everywhere – in every piece of hardware and software. They exist across the entire IT stack including data, applications, endpoints and the network. A privileged user is any user that has the capability to change, alter or impact the operational service of a business process. So, in any organization, this includes not only system administrators, but some people you may not consider privileged users today. Think about some of your business users and even social networking account managers. Do they have access privileges to impact important business processes?

Privilege is At The Center of the Attack Lifecycle Typical Lifecycle of a Cyber Attack Privilege is At The Center of the Attack Lifecycle

CyberArk Breaks the Attack Chain

Solving The Privileged Account Security Problem Enterprise Cloud SCADA/ICS Advanced, External Threats Insider Threats Securing Application Credentials Securing Shared Admin Accounts Threats Control & Accountability for Privileged Users Monitor & Record Privileged Activity Compliance Reporting Remote User Access Control Audit & Compliance We’ve talked a lot about how critical privileged account security is to address advanced threats and malicious insiders. But it’s important to know that industry and government compliance standards and regulations require the protection and monitoring of privileged accounts. We address these issues in your physical on-premises environment, across private, hybrid and public cloud environments as well as in SCADA and industrial control environments where we already have over 100 deployments.

10 slides is enough– show us the demo!

DNA - Discovery & Audit Discover where your privileged accounts exist Clearly assess privileged account security risks Identify all privileged passwords, SSH keys, and password hashes Collect reliable and comprehensive audit information

Thank you! Brandon Traffanstedt – Systems Engineer Southeast (404) 594-2331 Brandon.Traffanstedt@cyberark.com