Catch the full recorded webinar here: https://www.beyondtrust.com/resources/webinar/external-attacks-government-privileged-accounts/
Privileged accounts and credentials comprise the keys to the enterprise kingdom, and our coveted by hackers--who are too often successful.
This federal privileged access management (PAM) presentation from the webinar of Cyber security expert, and BeyondTrust Director of Product Management, Rod Simmons, will provide:
- An overview of the threats to privileged accounts
- How external attacks, once successful, can tranform into an insider-type attack
-How to defuse risk across three layers of attack
-How to effectively implement the principle of least privilege
29. Of errors occurred due to user error
because of a capacity shortage
Honorable Mention
Publishing Errors – Publishing a document to the internet
Misconfiguration – ex. Mistake in a firewall rule exposes access
39. Number of Vulnerabilities that account
for 85% of breaches
96% of All breaches are from
vulnerabilities over 1 year old. Our
challenge is what 10 vulnerabilities
41. Half of all exploitations happen
between 10 and 100 days after
the vulnerability is published
42. 90% of Cyberespionage breaches capture
trade secrets or proprietary information
14% of Insider and Privilege Misuse are in
leadership roles
14% of Insider and Privilege Misuse are
system admin and developers
63. Next Steps
1. Prepare today so you are ready to stop
breaches tomorrow.
2. Establish a process to secure identities
and define trust level?
3. Understand the difference between
security asset and identity risk
4. Talk to a solutions provider about how to
identify and address gaps.
65. Trust the solution relied upon by more than 200 federal
departments, agencies and all five branches of the US Military.
Learn more about BeyondTrust solutions for Privilege Access
Management, and Vulnerability Management in government.
www.beyondtrust.com/government
federalsales@beyondtrust.com
800-234-9072