Roundtable Discussion: Security Beyond Cyber Infrastructure Fortifying your cyber posture against the prime attack vector – Privileges

Leon Tan, PAM Evangelist, BeyondTrust

With more than 80% of security breaches involving privileged credentials, excessive or poorly managed privileges have become a top challenge that many cyber practitioners struggle with. This cybersecurity headache augmented further for Singapore-based IT leaders, as a recent survey conducted by BeyondTrust revealed that more than half of these IT leaders believe that users in their organisations have excessive privileges beyond what is required to do their jobs.

While 97% of public sector and 83% private sector companies consider zero trust as a priority, the sheer amount of lurking excessive privileges amplifies the security gap that companies need to address. So what can be done to narrow this gap? How can organizations guard against privileged escalation attacks while boosting employee productivity?

Join a group of cybersecurity leaders across industries, as they exchange concerns, ideas, and practices in mitigating common threats.