Abstract: There are many ways to covertly obtain access to user accounts, including: week passwords, accounts still valid after a user leaves the enterprise, dormant or lingering test accounts, shared accounts that have not been changed in months or years, service accounts embedded in applications for scripts, a user having the same password as one they used for an online account. Learn how CIS Control 5 can mitigate some of the most common ways credentials are compromised.
Sponsor: Keeper Security interview with Marcia Dempster, Sr. Director of Channel Sales at minute 48:21.
Learn more here: https://www.keepersecurity.com/
Marcia Dempster: https://www.linkedin.com/in/marcia-dempster-03280914/
Sponsor: CIS CIS-CAT (https://learn.cisecurity.org/cis-cat-lite)
Ryan Weeks: https://www.linkedin.com/in/ryanweeks/
Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/
Wes Spencer: https://www.linkedin.com/in/wesspencer/