Protecting Credentialed Information

CyberArk's Middleton-Leal on Why Understanding Behavior is Key
Understanding the behavior patterns of individuals with access to an organization's most important credentials is one of the keys to privileged management, says CyberArk's Matt Middleton-Leal.

He says that to a normal person, deleting a database may not look malicious.

"But if you don't understand that they should not be doing that, that [it] actually holds the data for [your] core banking system, [then] you've now cost the organization millions of dollars."

Middleton-Leal says the key is to understand the behavior, monitor and look for suspicious activity and then report upon that.

In an interview at the Infosecurity Europe 2014 conference in London, Middleton-Leal discusses:

  • Strategies for securing privileged credentials;
  • Accepting that perimeter security is not enough;
  • What the future holds for privilege management.

Middleton-Leal is UK and Ireland regional director at CyberArk. He is responsible for overseeing sales and partnerships in the region, as well as growing the business. Prior to joining CyberArk in 2012, Matt was the business unit executive at IBM Security Systems. In this position he was responsible for IBM's UK & Ireland security sales, technical and marketing teams. Prior to his five year tenure at IBM, Matt was at CA for six years, with responsibility for CA's largest security accounts.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.