October 2018 AST 'ASTORS' Finalist Edition Oct 2018 AST Magazine Final (10.16.18) | Page 72
Government
agencies and departments must
Volume 27
do more to protect their critical assets by pri-
oritizing the protection of their most im-
portant privileged accounts, credential and
secrets.
September 2018 Edition
Start by identifying any potential vulnerabil-
ities in existing privileged access security pro-
grams and work to remediate those weaknesses
by directly addressing the most common types of
attacks used to exploit privileged access.
Most importantly, remember to continual-
ly reassess and improve upon privileged
access security efforts as the cyber threat
environment and any organizational re-
quirements evolve over time.
Maintaining the optimum level of protec-
tion for privileged access requires staying
vigilant.
About the Author:
As director of U.S. federal business at CyberArk, Kevin
Corbett is passionate about helping agencies “think
like an attacker” with an “assume breach” mentality in
order to put proactive controls in place to protect their
most sensitive credentials – the ones that attackers in-
creasingly seek out to carry out attacks.
70