SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1
Internal & External
Threats: How to
Address Growing
Privileged Access &
Identity Threats
May 24, 2018
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2
Sam Elliott
Sr. Director of Security Product
Management
Karl Lankford
Sr. Solutions Engineer
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3
@Bomgar
#bomgarwebinar
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4
• 2018 Threat Landscape
• “Problems with Privilege”
• Insider and Third-Party Risks
• Protecting Privileged Identities and Access
from Threats
• Q&A
• Additional Resources
Agenda
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5
• 62 % of respondents
think it’s possible or
definite they’ve suffered
a breach through insider
action
• 66% of respondents think
it’s possible or definite
they have suffered a
breach through third-
party access
2018 Threat Landscape
https://www.bomgar.com/resources/whitepapers/privileged-access-threat-report
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6
But I need to
do my job
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7
A Matter of Trust
• Organizations placing high
trust in insiders and third-
party vendors
• Good faith isn’t good enough
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8
A Matter of Trust
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9
A Matter of Trust
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10
• The ‘Insider Risk
• The ‘Third-Party’ Risk
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11
More and More
People and Systems
Are Gaining Privileges
• Privileges are easy to give,
but difficult to retract
• Failure to secure credentials
used by non-standard users;
service desks, service
accounts, app to app, third
party vendors, etc.
• Limited visibility into all
privileged accounts across
the enterprise
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12
The ‘Insider Risk’
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13
The ‘Insider Risk’
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14
Insider Risk “Hollywood” example
• Sysadmin
• Misused privileges
• Locked other
administrators out
of their accounts
• Shutdown security
systems
• Result: Actions
caused loss of life
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15
In the
News:
Insider
Risk
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16
In the
News:
Insider
Risk
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17
The ‘Third Party’ Risk
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18
The ‘Third Party’ Risk
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19
In the
News:
Third Party
Risk
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21
• Not using PIM Solutions
• No control of privileged credentials
• Manually controlling privileged credentials
• Using PIM Solutions
• Less severe security breaches
• Better Visibility
Control
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22
• Not using PIM Solutions
• No control of privileged credentials
• Manually controlling privileged credentials
• Using PIM Solutions
• Less severe security breaches
• Better Visibility
Control
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23
Confidence
• Greater visibility into who’s accessing what systems
• Greater visibility into when the systems are being access and for how long
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24
Security
• Shrink the attack surface
• Deploy solutions with ‘security by
design’
• Deploy solutions that don’t
impede productivity
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26
Make Least Privilege Productive
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 27
Problem #1:
Remote Access
#1 attack pathway
Problems to Solve
Problem #2:
Privileged Credentials
Used in almost every data breach
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 28
Secure Vendor Access
• External vendors are “low hanging
fruit” because they have to adhere
to your policies
• The number of third-parties
connecting to company networks is
rapidly increasing
• Eliminate VPNs for vendors to
improve security and access
management
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 29
Secure Insider Access
• Any employee who has privileged
access:
• IT Admins
• IT Operations
• Operational Technologists
• Service Desks
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 30
Discover and Safely Store
Passwords
• Leverage an automated discovery
tool to continuously find privileged
accounts on your network
• Secure and manage credentials in
an enterprise identity management
solution
• Increase productivity by eliminating
check-in/check-out and
automatically injecting credentials
into a session
• Eliminating their visibility to the
credential reduces threat of being
phished or used through another
pathway
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 31
Rotate and Randomize
Privileged Credentials
• Ensure every local credential that
has some type of admin right has a
unique credential – no more shared
passwords
• Stop lateral movement by
eliminating common credentials
across endpoints
• If a credential is compromised, it
won’t be useful for long because
it’s rotated
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 32
Protect Service Accounts
• Manage business uptime, but
ensure those credentials can still
be rotated
• Critical business systems often
have the same service account for
years
• Ensure critical systems stay
productive and don’t have
cascading failures while securing
them
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 33
Fortify App to App Security
• Malicious users can compromise
had coded credentials in a script or
an application
• Remove a prime target with app to
app credential security
• Obscure credential through an
identity management solution and
rotate them to remove threat
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 34
Make Least Privilege Productive
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 35
Support Users. Access Endpoints. Protect Credentials
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 36
• 2018 Privileged Access Threat
Report
• 2018 PATR Infographic
• Four Pitfalls of Privilege
• Six Steps to Secure Access for
Privileged Insiders and Vendors
• Bomgar Privileged Access
• Bomgar Privileged Identity
Additional Resources
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 37
Questions?
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 38
Thanks for
Joining Us!
bomgar.com/resources/whitepapers/
privileged-access-threat-report

Contenu connexe

Tendances

Tendances (20)

The Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and OutThe Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and Out
 
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
The Case for a Turnkey Approach to Fraud Operations
The Case for a Turnkey Approach to Fraud OperationsThe Case for a Turnkey Approach to Fraud Operations
The Case for a Turnkey Approach to Fraud Operations
 
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
 
Scrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budgetScrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budget
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
FIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo Japan
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah Khalil
 

Similaire à Bomgar 2018 Privileged Access Threat Report

Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Kehinde Tolude
 

Similaire à Bomgar 2018 Privileged Access Threat Report (20)

Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
 
Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018
 
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
 
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
 
When a Certificate Authority Fails, How Quickly Can You Restore Trust?
When a Certificate Authority Fails, How Quickly Can You Restore Trust?When a Certificate Authority Fails, How Quickly Can You Restore Trust?
When a Certificate Authority Fails, How Quickly Can You Restore Trust?
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Beat The Gender Pay Gap: An "Outside The Box" Solution
Beat The Gender Pay Gap: An "Outside The Box" SolutionBeat The Gender Pay Gap: An "Outside The Box" Solution
Beat The Gender Pay Gap: An "Outside The Box" Solution
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptx
 
New Research on Security Risks and Blind Spots in Current Identity Management...
New Research on Security Risks and Blind Spots in Current Identity Management...New Research on Security Risks and Blind Spots in Current Identity Management...
New Research on Security Risks and Blind Spots in Current Identity Management...
 
2017 Gartner IAM Summit
2017 Gartner IAM Summit2017 Gartner IAM Summit
2017 Gartner IAM Summit
 
Reducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained EnvironmentsReducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained Environments
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Garth Grahams Stratmor Slides from Digital Mortgage Conference 2017
Garth Grahams Stratmor Slides from Digital Mortgage Conference 2017Garth Grahams Stratmor Slides from Digital Mortgage Conference 2017
Garth Grahams Stratmor Slides from Digital Mortgage Conference 2017
 
Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...Flight East 2018 Presentation–You've got your open source audit report, now w...
Flight East 2018 Presentation–You've got your open source audit report, now w...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Bomgar 2018 Privileged Access Threat Report

  • 1. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Internal & External Threats: How to Address Growing Privileged Access & Identity Threats May 24, 2018
  • 2. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2 Sam Elliott Sr. Director of Security Product Management Karl Lankford Sr. Solutions Engineer
  • 3. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3 @Bomgar #bomgarwebinar
  • 4. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4 • 2018 Threat Landscape • “Problems with Privilege” • Insider and Third-Party Risks • Protecting Privileged Identities and Access from Threats • Q&A • Additional Resources Agenda
  • 5. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5 • 62 % of respondents think it’s possible or definite they’ve suffered a breach through insider action • 66% of respondents think it’s possible or definite they have suffered a breach through third- party access 2018 Threat Landscape https://www.bomgar.com/resources/whitepapers/privileged-access-threat-report
  • 6. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6 But I need to do my job
  • 7. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7 A Matter of Trust • Organizations placing high trust in insiders and third- party vendors • Good faith isn’t good enough
  • 8. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8 A Matter of Trust
  • 9. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9 A Matter of Trust
  • 10. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10 • The ‘Insider Risk • The ‘Third-Party’ Risk
  • 11. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11 More and More People and Systems Are Gaining Privileges • Privileges are easy to give, but difficult to retract • Failure to secure credentials used by non-standard users; service desks, service accounts, app to app, third party vendors, etc. • Limited visibility into all privileged accounts across the enterprise
  • 12. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12 The ‘Insider Risk’
  • 13. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13 The ‘Insider Risk’
  • 14. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14 Insider Risk “Hollywood” example • Sysadmin • Misused privileges • Locked other administrators out of their accounts • Shutdown security systems • Result: Actions caused loss of life
  • 15. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15 In the News: Insider Risk
  • 16. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16 In the News: Insider Risk
  • 17. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17 The ‘Third Party’ Risk
  • 18. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18 The ‘Third Party’ Risk
  • 19. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19 In the News: Third Party Risk
  • 20. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20
  • 21. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21 • Not using PIM Solutions • No control of privileged credentials • Manually controlling privileged credentials • Using PIM Solutions • Less severe security breaches • Better Visibility Control
  • 22. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22 • Not using PIM Solutions • No control of privileged credentials • Manually controlling privileged credentials • Using PIM Solutions • Less severe security breaches • Better Visibility Control
  • 23. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23 Confidence • Greater visibility into who’s accessing what systems • Greater visibility into when the systems are being access and for how long
  • 24. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24 Security • Shrink the attack surface • Deploy solutions with ‘security by design’ • Deploy solutions that don’t impede productivity
  • 25. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25
  • 26. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26 Make Least Privilege Productive
  • 27. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 27 Problem #1: Remote Access #1 attack pathway Problems to Solve Problem #2: Privileged Credentials Used in almost every data breach
  • 28. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 28 Secure Vendor Access • External vendors are “low hanging fruit” because they have to adhere to your policies • The number of third-parties connecting to company networks is rapidly increasing • Eliminate VPNs for vendors to improve security and access management
  • 29. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 29 Secure Insider Access • Any employee who has privileged access: • IT Admins • IT Operations • Operational Technologists • Service Desks
  • 30. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 30 Discover and Safely Store Passwords • Leverage an automated discovery tool to continuously find privileged accounts on your network • Secure and manage credentials in an enterprise identity management solution • Increase productivity by eliminating check-in/check-out and automatically injecting credentials into a session • Eliminating their visibility to the credential reduces threat of being phished or used through another pathway
  • 31. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 31 Rotate and Randomize Privileged Credentials • Ensure every local credential that has some type of admin right has a unique credential – no more shared passwords • Stop lateral movement by eliminating common credentials across endpoints • If a credential is compromised, it won’t be useful for long because it’s rotated
  • 32. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 32 Protect Service Accounts • Manage business uptime, but ensure those credentials can still be rotated • Critical business systems often have the same service account for years • Ensure critical systems stay productive and don’t have cascading failures while securing them
  • 33. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 33 Fortify App to App Security • Malicious users can compromise had coded credentials in a script or an application • Remove a prime target with app to app credential security • Obscure credential through an identity management solution and rotate them to remove threat
  • 34. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 34 Make Least Privilege Productive
  • 35. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 35 Support Users. Access Endpoints. Protect Credentials
  • 36. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 36 • 2018 Privileged Access Threat Report • 2018 PATR Infographic • Four Pitfalls of Privilege • Six Steps to Secure Access for Privileged Insiders and Vendors • Bomgar Privileged Access • Bomgar Privileged Identity Additional Resources
  • 37. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 37 Questions?
  • 38. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 38 Thanks for Joining Us! bomgar.com/resources/whitepapers/ privileged-access-threat-report