Preempt Blog

The latest insights and advice to keep your company protected from insider threats and breaches

CEO Interview: Today’s Threat Landscape Demands Conditional Access Everywhere

Today, too many organizations are approaching complex cybersecurity challenges by attempting to hire their way out of the problem while building disjointed and ineffective security implementations. In a recent interview with Security Weekly, Preempt CEO Ajit Sancheti explains what the modern threat landscape means for today’s enterprise security teams. His conversation with Paul Asadoorian, Founder and CEO of Security Weekly, also outlines how CISOs can use a Conditional Access security posture to address the challenges of the cybersecurity talent shortage and the unfortunate reality that most organizations can’t see or respond to malicious network activity in real-time.

The best measure of controlling your attack surface is identity – who is accessing what, and where, when and how. To address threats, enterprises must take a modern approach to authentication to secure all applications, data and assets – regardless of where they’re housed – using a dynamic security model that takes into account identity, behavior and risk.

The challenges are widespread: Preempt research finds 1 in 3 networks has exposed passwords, while more than 70 percent have stealthy admins. Security teams are overloaded, with a one-two punch of a lack of cybersecurity talent to hire, combined with a status quo of Frankenstein software implementations resulting in an avalanche of false alerts, security solutions that don’t talk to each other, and excessive manual and impossible to scale security processes.

Watch Ajit’s conversation with Security Weekly at the March SecureWorld Boston conference to learn:

  • How security analysts can make better judgment calls and auto-remediate incidents
  • How you can apply the formula of Identity, Behavior and Risk to achieve conditional access, everywhere
  • What the customer journey should look like for implementing an effective security solution (e.g. walk before you run)
  • How to watch for and respond to privilege escalation and lateral movement, including handling common attack vectors, from PsExec to Mimikatz

 

 

 

Topics: Conditional Access,

Posted by Matt Culbertson on April 15, 2019 1:46 AM

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More

Developer

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus...

Read More

Events

A Simplified Approach to Network Segmentation

Network segmentation has long been one of the most valuable tools for protecting ...

Read More

Research

10 Things You Need to Know About Kerberos

As our research team continues to find vulnerabilities in Microsoft that bypass all major

Read More

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More