
Privileged Access Management: Break the Kill Chain
How PAM and Threat Analytics Can Stop Attackers Before Damage is Done
January 25, 2017
Audio is streamed directly from the publisher (ismg-cdn.nyc3.cdn.digitaloceanspaces.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
About this episode
Targeted breaches are increasing and they share a common thread - a kill chain that exploits privileged users and their credentials to gain access to sensitive systems. Steve McCullar of CA Technologies discusses how privileged access management can break that kill chain.