October 2018 AST 'ASTORS' Finalist Edition Oct 2018 AST Magazine Final (10.16.18) | Page 72

Government agencies and departments must Volume 27 do more to protect their critical assets by pri- oritizing the protection of their most im- portant privileged accounts, credential and secrets. September 2018 Edition Start by identifying any potential vulnerabil- ities in existing privileged access security pro- grams and work to remediate those weaknesses by directly addressing the most common types of attacks used to exploit privileged access. Most importantly, remember to continual- ly reassess and improve upon privileged access security efforts as the cyber threat environment and any organizational re- quirements evolve over time. Maintaining the optimum level of protec- tion for privileged access requires staying vigilant. About the Author: As director of U.S. federal business at CyberArk, Kevin Corbett is passionate about helping agencies “think like an attacker” with an “assume breach” mentality in order to put proactive controls in place to protect their most sensitive credentials – the ones that attackers in- creasingly seek out to carry out attacks. 70