Privileged Accounts and the Cyber Attack Life Cycle

Mandiant Consulting’s 2016 M-Trends report once again shows that cyber attacks follow a regular pattern of crashing through perimeter defenses, obtaining a credential and then using the acquired access to move laterally throughout the network and escalate privileges to complete their primary objective. Once attackers obtain privileged credentials, they can slowly gain control of the entire organization’s IT environment.

This session will focus on how attackers find their way to the heart of enterprises, the role privileged credentials (passwords and SSH keys) play in an active cyber attack, and how the integration of CyberArk Privileged Account Security Solution and the FireEye Threat Analytics Platform (TAP)  can help organizations detect, alert and rapidly respond to cyber attacks.

The audience will be walked through a few data breach examples and shown how combining intel from both systems is used to assist in detection and response acceleration. Attendees can expect to gain an advanced understanding of how they can start leveraging their enterprise-wide data and privileged threat analytics to quickly identify and disrupt the most critical in-progress attacks. 

Register today.

Featured Partner:

Adam Bosnian

EVP, Global Business Development,CyberArk
Milan Gavran
TAP Sales Manager, FireEye

Tuesday, May 24, 2016
2 p.m. ET/11 a.m. PT

© 2018 FireEye, Inc. All rights reserved. Privacy Policy.