Access Management , Customer Identity & Access Management (CIAM) , Cybercrime

Endpoint Least Privilege: A Foundational Security Control

CyberArk's David Higgins on Building Better Defense for Ransomware, Other Threats
David Higgins, EMEA technical director, CyberArk

Amid the current ransomware surge, it's time for the principle of least privilege to meet endpoint security and be a new foundational security control, says David Higgins of CyberArk. He outlines the cybersecurity use cases and potential business benefits.

See Also: Now OnDemand | C-Suite Round-up: Connecting the Dots Between OT and Identity

In this video interview with Information Security Media Group, Higgins discusses:

  • The case for endpoint least privilege;
  • How the principle of least privilege addresses ransomware and other threats;
  • Other uses cases and benefits from endpoint least privilege as a fundamental security control.

Since joining CyberArk in 2010, Higgins has worked to help the world’s leading - and most complex - organizations secure and protect their privileged access. Today, he advises clients on threats associated with privilege escalation, lateral movement and credential theft and discusses best practices and driving innovation around privileged management processes.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.