- Look for, and try to attack privileged accounts that are vulnerable.
- Establish an attack vector to gain access to the accounts.
- Identify privileges that extend beyond the boundary of the system they are on
- Rinse and repeat.
- Scan your network - Ensure that forgotten privileged accounts on endpoints are discovered, and brought under management.
- No account gets left behind – Create a common policy framework that makes sure that accounts that get brought under management stay under management.
- Make sure access is authorized – Leverage Adaptive Workflow Control to restrict network connections to ensure that the people logging onto your systems originate from the correct location.
- Audit what users are doing – Video record all user interaction to systems potentially exposed to the outside. Log all keystrokes, and allow rapid forensics to pinpoint what was typed and what was seen.
Martin has been helping organizations solve challenges in the privileged account management and identity and access management space for over 24 years. At Dell Software, Martin managed a team of Solution Architects, focused on designing and implementing solutions in the Privileged Account Management (PAM) space. Prior to joining Dell, Martin was Sr. Product Manager for Novell Privileged User Manager, a privilege management application acquired from Fortefi, an organization where he served as Vice President, Corporate Development. Prior to this, he was Program Manager of Client Technologies at Symantec where he was responsible for many ground-breaking field and channel enablement applications. Additionally, Martin managed the European QA group at Axent Technologies and has held various management positions in consulting, systems development, and operations. Martin is a regular speaker for security events, and webinars.