Access Management

How PAM Tackles Accelerated Change in the Threat Landscape

David Higgins of CyberArk on Addressing Attack Basics That Do Not Change
David Higgins, EMEA technical director, CyberArk,

The modern threat environment continues to evolve, with automation, the move to the cloud, software as a service, AI, new user expectations and increasingly sophisticated attacks from threat actors. How do we cope with those changes today - and the certainty that there will be new challenges tomorrow?

We do so by addressing the fundamentals of attack that don't change: Attackers use deception, steal identities and escalate privileges until they reach their target - and we evolve our defenses in line with the changed context.

"We can't secure everything on day one. We need a risk-based access approach. We need to categorize the access use cases and secure the highest-risk access first, said David Higgins, EMEA technical director, CyberArk.

In this interview with Information Security Media Group, Higgins also discusses:

  • How to address the main challenges faced by defenders today;
  • What our strategy needs to be in order to cope with tomorrow's unknown threats;
  • How ID has played a key role in security and will continue to do so.

Since joining CyberArk in 2010, Higginshas worked to help the world's leading - and most complex - organizations to secure and protect their privileged access. Today, he advises clients on threats associated with privileged escalation, lateral movement and credential theft and discusses best practices and driving innovation around privileged management processes.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.