Privileged accounts - for both users and service accounts - abound in every healthcare organisation. Almost all these organisations suffer from extreme service account sprawl, perpetuating the unmanaged, uncontrolled expansion of their privileged account attack surface.
And yet a compromised privileged account can be the difference between a simple network breach and a cyber catastrophe. That’s because when privileged credentials get compromised, it allows the attacker to impersonate a trusted employee or system and carry out malicious activity without being detected as an intruder. Once attackers compromise a privileged account, they can typically roam at will through the IT environment and steal organisation and patient information and/or the OT environment and wreak havoc.
Get the answers to these important questions
· How easy is it to hack most privileged accounts?
· How is a hacked account used to elevate privileges and move laterally across my network?
· What methods do attackers use to quickly make their way to my critical systems?
What will I learn?
· Which common tools and techniques cyber criminals use to compromise privileged credentials and elevate access.
· The current best methods used to reduce the risk of a privileged account attack on IT and OT environments.