with Christopher Hills, Deputy Chief Technology Officer, BeyondTrust
The astonishing nation-state breach of SolarWinds and subsequent supply chain fallout will take many years to completely unravel, but what has been unearthed already tells us plenty. Any organization can be a threat actor’s target, and any application with excessive privileges (i.e. Orion) can be leveraged against the entire company, with devasting consequences.
In this session, Chris Hills, BeyondTrust Deputy CTO, will dissect the two components of the Solar Winds attack:
The attack on SolarWinds & how SolarWinds could have prevented or mitigated it
The supply chain attack & how Orion customers could limit exposure and reduce risk
The attack on SolarWinds and the risk presented by legacy applications with too much privilege access is not a unique case. To wrap-up Chris will discuss the vast scope of this risk and cover some closing thoughts;
How to determine your privilege risk with other legacy applications
Steps to prevent or mitigate your risk to application privileges
The role Universal Privilege Management would play in protecting SolarWinds from attack, as well as helping Orion customers better defend themselves