See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter ofif, butwhen,your organization will be breached. Threat actors target the path of least resistance: users and their privileges.
Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials.Â
This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access.
What You Will Learn
- Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack
- Implement defensive and monitoring strategies to mitigate privilege threats and risk
- Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journey
- Develop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity
Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems