Bad Guys Look Just Like You
Offered By: YouTube
Course Description
Overview
Explore a 20-minute conference talk from GrrCon 2016 that delves into the critical issue of privileged credentials and their role in cybersecurity. Learn about the 30 Day Cybersecurity Sprint Memo and how privilege escalation enables asset escalation. Discover the mission of control, visibility, and detection in cybersecurity, and understand how CyberArk breaks the attack chain. Gain insights into primary recommendations and comprehensive controls on privileged activity, concluding with actionable steps to implement immediately for improved security.
Syllabus
Intro
Privileged Credentials are Everywhere
30 Day Cybersecurity Sprint Memo
Privilege Escalation Enables Asset Escalation
Our Mission: Control
Our Mission: Visibility
Our Mission: Detection
CyberArk Breaks the Attack Chain
Primary Recommendations
Comprehensive Controls on Privileged Activity
What to do NOW
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube