Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Deconstructing the Twitter Attack: It’s Time to Prioritize Privileged Access Management

ON-DEMAND WEBINAR
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Join Us On-Demand!

Presenter: Matt Tarr, principal solutions engineer for CyberArk


Same old story. Motivated to cause disruption or by a potential financial gain, attackers follow a tried and true attack path typically starting at the endpoint with phishing. Industry research shows 80% of successful security attacks involve compromised privileged access. In the case of Twitter’s high-profile breach, an insider threat adds another familiar element to the story.

With a dramatic increase of remote workers comes an expanded attack surface. Workers today are distracted while juggling work and family responsibilities, and there is increased stress related to a global pandemic and an uncertain economic future. There's not a better time to review the priorities of your security program to ensure policies and practices reflect new realities.

Questions every security leader asking right now: how are we identifying what our most critical systems, tools, data and infrastructure are and who has access? Who is considered a privileged user (this includes business users) and what steps are we taking to manage, monitor and protect that access?

Join us on-demand to learn about security trends and best practices including:

    • Reasons identity is the new perimeter
    • Isolating access to the administrative system and requiring dual control for highly sensitive operations 
    • Continuous monitoring and user behavior analysis on applications through a monitored proxy
    • Implementing least privilege controls to minimize access to sensitive functionality

The Twitter attack highlights the dangers of unsecured privileged access to critical resources and how quickly any credential or identity can become privileged under certain conditions.


ON-DEMAND

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world's leading companies — including more than 50% of the Fortune 500 — to protect their highest-value information assets, infrastructure and applications.