Privileged Accounts: Keys to the Kingdom
Stealing and exploiting privileged accounts is critical for threat actors in 100% of all advanced attacks. In this session, we’ll look behind the scenes on some of the most high profile breaches and the role privilege has played in these sophisticated attacks. Armed with this knowledge, CyberArk will then discuss a structured 7 step hygiene program to bring visibility and control to their most sensitive accounts.
Speakers Bio: From operations to sales, Chris has held a variety of roles in Information Technology and Enterprise Security. Prior to joining CyberArk, Chris started his IT career with the Canadian Armed Forces and was most recently at Hewlett Packard Enterprise. He has extensive experience in deploying enterprise-wide security, automation, monitoring and service management technologies. His certifications include CISSP, CISA, CEH, and TOGAF9.