Presentation is loading. Please wait.

Presentation is loading. Please wait.

Brandon Traffanstedt Systems Engineer - Southeast

Similar presentations


Presentation on theme: "Brandon Traffanstedt Systems Engineer - Southeast"— Presentation transcript:

1 Brandon Traffanstedt Systems Engineer - Southeast
The Privileged Pathway: Securing and Auditing Privileged Accounts Using CyberArk Brandon Traffanstedt Systems Engineer - Southeast

2 The New Cyber Battleground: Inside Your Network
Over 90% of organizations have been breached Strategic shift from “I can stop everything at the perimeter.” to “I can’t stop anything at the perimeter.” Over 38% of breaches are internal – and the most costly Need to protect against malicious and accidental insiders Ponemon – Cost of Cyber Breaches 2012 – “The most costly breaches, including denial of service, malicious insiders and web-based attacks, account for 58% of overall cost of data breaches…Insider attacks can take an average of more than 50 days to contain…. 38% of benchmark organizations suffered attack by malicious insiders 38% of breaches are insiders; accidental insiders another 35%.... Wow – that’s huge – 38% of breaches are insides…accidental is another 35%....so 83% of breaches are from the inside According to a 2012 Ponemon institute study…Insider breaches can take more 50 days to contain!!!! Information security focus shifts to inside the network Proactive protection of critical assets Real-time detection of in-progress attacks

3 Cyber Attacks Are a Daily Event
Web Articles Not a day goes by when we don’t read about another serious breach. And in almost every single instance, privileged accounts are exploited by the attacker… The list from 2012 alone includes…. Flame Saudi Aramco University of Georgia Toyota Subway US Chamber of Commerce State of South Carolina Red October ….I could go on…

4 Privileged Accounts: Pathway to Cyber Attacks
“…once they have privileged credentials, they are pretty much home free.” Deloitte, 2014

5 Privileged Accounts - “Keys to the IT Kingdom”
Malicious Insiders External Attackers CyberArk Provides Proactive Protection and Detection

6 Privileged Credentials are Everywhere
Privileged Accounts Routers, Firewalls, Hypervisors, Databases, Applications Routers, Firewalls, Servers, Databases, Applications Laptops, Tablets, Smartphones Power Plants, Factory Floors WiFi Routers, Smart TVs Where are your privileged accounts? They are everywhere – in every piece of hardware and software. They exist across the entire IT stack including data, applications, endpoints and the network. A privileged user is any user that has the capability to change, alter or impact the operational service of a business process. So, in any organization, this includes not only system administrators, but some people you may not consider privileged users today. Think about some of your business users and even social networking account managers. Do they have access privileges to impact important business processes?

7 Privilege is At The Center of the Attack Lifecycle
Typical Lifecycle of a Cyber Attack Privilege is At The Center of the Attack Lifecycle

8 CyberArk Breaks the Attack Chain

9 Solving The Privileged Account Security Problem
Enterprise Cloud SCADA/ICS Advanced, External Threats Insider Threats Securing Application Credentials Securing Shared Admin Accounts Threats Control & Accountability for Privileged Users Monitor & Record Privileged Activity Compliance Reporting Remote User Access Control Audit & Compliance We’ve talked a lot about how critical privileged account security is to address advanced threats and malicious insiders. But it’s important to know that industry and government compliance standards and regulations require the protection and monitoring of privileged accounts. We address these issues in your physical on-premises environment, across private, hybrid and public cloud environments as well as in SCADA and industrial control environments where we already have over 100 deployments.

10 10 slides is enough– show us the demo!

11 DNA - Discovery & Audit Discover where your privileged accounts exist
Clearly assess privileged account security risks Identify all privileged passwords, SSH keys, and password hashes Collect reliable and comprehensive audit information

12 Thank you! Brandon Traffanstedt – Systems Engineer Southeast
(404)


Download ppt "Brandon Traffanstedt Systems Engineer - Southeast"

Similar presentations


Ads by Google