IBM Verify

 View Only
Expand all | Collapse all

Privileged accounts: The weakest link in the ransomware attack chain?

  • 1.  Privileged accounts: The weakest link in the ransomware attack chain?

    Posted Wed March 16, 2022 03:41 PM
    Edited by Patrick Ancipink Wed March 30, 2022 11:13 AM
    Summary

    Ransomware-as-a-service has lowered the barrier to entry for cybercriminals to deploy sophisticated attacks and collect cryptocurrency through extortion. The key to success for attacks is the compromise of privileged user accounts that unlock valuable, sensitive data that can be held for ransom. Yet, best practice privilege access management (PAM) is still elusive for companies and government entities of all sizes and levels of security maturity. Expired accounts, unnecessarily elevated privileges, and insider abuse are too common. Just being a little bit bad at PAM can expose you to an increased risk of ransomware attack success.
    This webinar will focus on easy-to-implement PAM controls that can help you neutralize attacks by:
    • Enforcing the principle of just-in-time, just-enough privilege across systems, devices and services
    • Continuously auditing and discovering privilege accounts, removing unnecessary admin rights
    • Monitoring for policy violations and suspicious behavior
    • Moving passwords to the background to reduce user fatigue and improve security
    • Integrating PAM into a broader zero trust posture

    Please join us on in this on demand recording. Share your questions below and register to watch here.

    ------------------------------
    Patrick Ancipink
    Security Product Marketing
    IBM
    Austin TX
    ------------------------------


  • 2.  RE: Privileged accounts: The weakest link in the ransomware attack chain?

    Posted Mon March 28, 2022 04:56 PM
    Excited for the webcast! This looks really interesting.

    ------------------------------
    Michael Williams
    ------------------------------



  • 3.  RE: Privileged accounts: The weakest link in the ransomware attack chain?

    Posted Wed March 30, 2022 11:43 AM

    Hi everyone,

    You can watch the on demand recording here and download the slides here.


    Please share any of your questions below.

    ------------------------------
    Patrick Ancipink
    Security Product Marketing
    IBM
    Austin TX
    ------------------------------




    ------------------------------
    Patrick Ancipink
    Security Product Marketing
    IBM
    Austin TX
    ------------------------------