Trust or Zero Trust: Working Remotely and Going Beyond Privileged Access Management

Webinar Registration

In this real training for free session we will look at how to deploy additional layers or preventive controls that remain effective even after allowing a privileged account to logon. 

Attacks often begin with a single, “low-value” endpoint or user account. But gaining privileged access is a critical intermediate goal between initial compromise and the attacker’s end goal of data exfiltration, extortion or destructive impact. If you have implemented privileged account management in your organization then kudos for you! Locking down access to privileged accounts like the local Administrator and root, service accounts, domain administrators, CISCO Enable, Application/SaaS Accounts, batch job/scheduled tasks/chron jobs and even normal user accounts with access to sensitive data with a password vault is a major layer of security around the accounts most targeted by attackers. 

But is there a way to implement more defense-in-depth layers around these privileged accounts? Right now, even with a classic PAM solution, you can do everything possible to protect access to a given privileged account but once you allow an entity (person, program, service, etc.) to logon with that account, your remaining defenses are detective in nature at best – nothing preventive. They can do anything. 

So, what can you do to limit risk in a preventive way after allowing a privileged account logon? There are basically 3 areas of post-logon preventive control:

  • Granular, dynamic access to privilege based on current task
  • Behavior analysis with ability to terminate activities
  • Application control

Our sponsor is Thycotic and my colleague Joseph Carson, an (ISC)2 Information Security Leadership Awardee, will be returning to help me present this session. After the education, Joe will briefly show how Thycotic combines PAM with least privilege, application control and more.

Please join us for this real training for free event.

First Name:   
Last Name:   
Work Email:  
Job Title:  
Zip/Postal Code:  
Company Size:

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us.



Additional Resources