3 steps to 4x the risk coverage of ca controlminder
TRANSCRIPT
![Page 1: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/1.jpg)
![Page 2: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/2.jpg)
Introduction – Marc F. Potter
25 years of Security Experience
Companies
Dell Security
Quest Software
CA Technologies
Cabletron Systems
Technologies Backgound
Security Event Management
End Point Security
Identity Governance
Privileged Management
ObserveITWorldwide Vice PresidentCorporate Strategy and Business Development
![Page 3: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/3.jpg)
Agenda
Current State of Managing Risk
Future State of Managing Risk
How CA Privileged Management Helps
3 Steps to Reduce your User Risk Posture
Next Steps
![Page 4: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/4.jpg)
SystemsApps Data InternalIT Users
BusinessUsers
VendorContractor
![Page 5: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/5.jpg)
![Page 6: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/6.jpg)
![Page 7: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/7.jpg)
![Page 8: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/8.jpg)
![Page 9: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/9.jpg)
Do you know who your high-risk users are?
Do you have the visibility into high-risk activity?
Are you focused on the right profile of users?
![Page 10: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/10.jpg)
![Page 11: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/11.jpg)
Database
NetworkAppliance
VirtualServer
Windows/UNIX/Linux
Application
Multiple Device Types
CAControlMinder
Secure Password Storage
IndividualAdministrators
SharedPrivilegedAccount
PasswordCheck-In
&Check-Out
Automatic Logins
Shared Account Management
Manual
Logins
11
![Page 12: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/12.jpg)
Business Users
84% of Insider based breaches involve users with no admin rights(Ponemon)
IT Users
62% of admin-caused breaches due to human error (Ponemon)
Contractors
Breaches involving contractors have significantly higher data loss and severity (VDBIR14)
![Page 13: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/13.jpg)
•••
OFFLINE MACHINE3RD PARTY MACHINE
MACHINE ID MAPPINGHELPDESK MACHINEREMOTE DESKTOPPC ADMIN RIGHTS
FINANCE DEPARTMENTCALL CENTER USER
ACCOUNTS PAYABLECONTRACTS TEAM
AUDITORDOCTOR/NURSE
CITRIX USER
•••
APPLICATIONSDATABASES
SERVERSNETWORKS
(PASSWORD VAULTS)
APPLICATIONSSENSITIVE DATA
FILE SHARESCLOUD SERVICES
![Page 14: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/14.jpg)
![Page 15: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/15.jpg)
BusinessUser
CitrixUser
ITUser
![Page 16: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/16.jpg)
1. Identify User-Based Access RiskBusiness Users ContractorsIT Administrators
2. Monitor and Alert on Suspicious ActivityCapture Behavior PatternsProfile Risk and AcceptanceAlert on Suspicious Changes
3. Investigate and RemediateForensics Log SearchNotification and PreventionSession ReplaySession Kill
![Page 17: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/17.jpg)
![Page 18: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/18.jpg)
![Page 19: 3 steps to 4x the risk coverage of CA ControlMinder](https://reader033.vdocuments.mx/reader033/viewer/2022060205/55a14f1e1a28abc2488b470a/html5/thumbnails/19.jpg)