Access Management , Global Compliance , Governance & Risk Management

Privileged Access Management: Break the Kill Chain

How PAM and Threat Analytics Can Stop Attackers Before Damage is Done
Privileged Access Management: Break the Kill Chain

Targeted breaches are increasing and they share a common thread- a kill chain that exploits privileged users and their credentials to gain access to sensitive systems. Steve McCullar of CA Technologies discusses how privileged access management can break that kill chain.

McCullar, an Advisor for CA Technologies Privileged Access Management solutions, says nearly 6 trillion records have been compromised by breaches since 2013, and if you look closely at the incidents - the evidence of his theory emerges.

"Privilege escalation is always on the kill chain, but it's not always the headliner," McCullar says. "You hear about a breach and you often hear 'Oh, it was a piece of malware.' But if you look at the analysis you'll find that, yes, that's how they got a low level person. But it was the step up to a high level of privilege that actually allowed them to bypass your security controls and take over your environment."

In an interview about PAM and threat analytics, McCullar discusses:

  • Where privileged access fits in the kill chain model;
  • How a mature approach to PAM can thwart attackers;
  • The role of threat analytics as an essential control.

McCullar is an Advisor for CA's Privileged Access Management solutions. In this role, he is responsible for ensure the success of CA Privileged Access Management among CA's customers and partners. He provides interface between Product Management and CA's customers, as well as all customer-facing aspects of CA's Privileged Access Management business, including sales, pre-sales, marketing, and services. He has more than 30 years of IT experience including more than 20 years of experience in the field of Privileged Access Management.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.