Governance; Privilege Management
Facebook Twitter LinkedIn

The Anatomy of a Privileged Account Hack

Combined Session
Wednesday, May 16, 2018 15:30—16:30
Location: ALPSEE

It is critically important to know how cyber criminals target their victims, what you can do to reduce the risk and make it more challenging for the attackers who steal your information, your identity or your money. It explains how outside attackers or malicious insiders can exploit vulnerabilities using examples such as a compromised email account password that escalates into a full-blown breach of network security.

Compromising a privileged account, therefore, can be the difference between a simple network breach and a cyber catastrophe. When a single system is compromised, it is typically easier to mitigate, isolate, and eradicate the risk and restore control. When a privileged account is breached, it can lead to a major disaster. That’s because when a privileged account gets hacked, it allows the attacker to impersonate a trusted employee or system and carry out malicious activity without being detected as an intruder. Once attackers compromise a privileged account, they can typically roam at will through an IT environment to steal information and wreak havoc. By describing the anatomy of a privileged account hack, we will show how cybercriminals target their victims, what you can do to reduce your risk and prevent abuse of your critical information assets.

Key Takeaways:

The Anatomy of a Privileged Account Hack
Presentation deck
The Anatomy of a Privileged Account Hack
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Joseph Carson
Joseph Carson
Thycotic
Joseph Carson is a cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specializing in blockchain, endpoint security, network security,...
Subscribe for updates
Please provide your email address