Securing Privileged Access First

Cyber-attackers target accounts and other elements of privileged access to rapidly gain access to targeted data and systems using credential theft and reuse attacks like token manipulation, Pass-the-Hash and Pass-the-Ticket.

Traditional security approaches have focused on using the organizations network as the primary security perimeter, but the network security is often bypassed especially when data and resources are hosted outside the traditional network boundary or when the adversaries obtains access on workstations inside the network boundary through phishing and other attacks.

Using examples from incidents, attacks and red team assignments to demonstrate the importance of governing privileged access and how it minimizes your organization’s attack surface and thwart in-progress attacks. 

  Back to timeline

Session information

Track: Security
Time and date: 08/02/2019, 14:00 - 15:00
Location: Room 1

  Add to calendar


Hasain Alshakarti

Company: TrueSec
Position: Senior Cyber Security Advisor