Brad Hibbert talks with Jeff Frick at the Four Seasons Hotel in East Palo Alto, CA.
#theCUBE #BeyondTrust #ChertoffGroup #SiliconANGLE
https://siliconangle.com/2017/08/30/what-companies-must-do-to-secure-their-networks-inside-the-walls-tcgsecurityseries/
What companies must do to secure their networks inside the walls
If you want to secure a computer, lock it in a safe and throw the safe in the ocean. If you want a computer system people actually use, there must be a way for them to access the system. This presents a security risk. While cybersecurity is good at making sure only the right people get into the system, hackers have figured out how to disguise themselves as legit users, according to Brad Hibbert (pictured), chief technical officer at BeyondTrust Inc., a global cybersecurity company.
“Hackers are going after the credentials, they’re going after the privileges, because that gives them more access to the corporate data,” Hibbert said.
Hibbert spoke with Jeff Frick (@JeffFrick), host of theCUBE, SiliconANGLE’s mobile livestreaming studio, during the recent Chertoff Group Security Series event in Palo Alto, California. They discussed matters of computer security, company culture and how BeyondTrust helps its clients guard against cyberthreats. (* Disclosure below.)
Keeping the keys to the cyberkingdom
BeyondTrust is focused on helping companies manage their cybersecurity risks, especially those from the internal environment. That means securing systems from inside the company, not just at the walls, Hibbert explained. This is important because hackers now go after the users to steal their access rather than attacking the system directly.
Users represent an easy target for hackers. Likewise, most security is at the gates, so a compromised user can pass under the radar while the bad guys use that access to do all sorts of nasty things, Hibbert stated. Access is tricky because people talk to their computers in so many ways. Phones, cameras, sensors, workstations and more all need securing. There’s no good way to manage this security patchwork. Beyond that, cybersecurity must also watch how people use their access once logged in to find the inevitable bad actors; it’s more than just passwords, Hibbert added.
Security is also cultural. A company must patch their programs. Admins need to secure new devices before hooking them into the system. Information technology has to manage access levels through the business. One machine, left unsecured, could compromise the whole network, according to Hibbert.
“It’s a big problem, and in a lot of organizations it’s a missing security layer,” Hibbert concluded.
Watch the complete video interview below, and be sure to check out more of SiliconANGLE’s and theCUBE’s coverage of The Chertoff Group Security Series “Security in the Boardroom.” (* Disclosure: TheCUBE is a paid media partner for The Chertoff Group Security Series “Security in the Boardroom.” Neither The Chertoff Group LLC nor BeyondTrust Inc. have editorial control over content on theCUBE or SiliconANGLE.)
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Chertoff Group Security Series 2017 | East Palo Alto. If you don’t think you received an email check your
spam folder.
Sign in to Chertoff Group Security Series 2017 | East Palo Alto.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Chertoff Group Security Series 2017 | East Palo Alto
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Chertoff Group Security Series 2017 | East Palo Alto.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Chertoff Group Security Series 2017 | East Palo Alto. If you don’t think you received an email check your
spam folder.
Sign in to Chertoff Group Security Series 2017 | East Palo Alto.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Chertoff Group Security Series 2017 | East Palo Alto
Please sign in with LinkedIn to continue to Chertoff Group Security Series 2017 | East Palo Alto. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Brad Hibbert, BeyondTrust | Security in the Boardroom 2017
Brad Hibbert talks with Jeff Frick at the Four Seasons Hotel in East Palo Alto, CA.
#theCUBE #BeyondTrust #ChertoffGroup #SiliconANGLE
https://siliconangle.com/2017/08/30/what-companies-must-do-to-secure-their-networks-inside-the-walls-tcgsecurityseries/
What companies must do to secure their networks inside the walls
If you want to secure a computer, lock it in a safe and throw the safe in the ocean. If you want a computer system people actually use, there must be a way for them to access the system. This presents a security risk. While cybersecurity is good at making sure only the right people get into the system, hackers have figured out how to disguise themselves as legit users, according to Brad Hibbert (pictured), chief technical officer at BeyondTrust Inc., a global cybersecurity company.
“Hackers are going after the credentials, they’re going after the privileges, because that gives them more access to the corporate data,” Hibbert said.
Hibbert spoke with Jeff Frick (@JeffFrick), host of theCUBE, SiliconANGLE’s mobile livestreaming studio, during the recent Chertoff Group Security Series event in Palo Alto, California. They discussed matters of computer security, company culture and how BeyondTrust helps its clients guard against cyberthreats. (* Disclosure below.)
Keeping the keys to the cyberkingdom
BeyondTrust is focused on helping companies manage their cybersecurity risks, especially those from the internal environment. That means securing systems from inside the company, not just at the walls, Hibbert explained. This is important because hackers now go after the users to steal their access rather than attacking the system directly.
Users represent an easy target for hackers. Likewise, most security is at the gates, so a compromised user can pass under the radar while the bad guys use that access to do all sorts of nasty things, Hibbert stated. Access is tricky because people talk to their computers in so many ways. Phones, cameras, sensors, workstations and more all need securing. There’s no good way to manage this security patchwork. Beyond that, cybersecurity must also watch how people use their access once logged in to find the inevitable bad actors; it’s more than just passwords, Hibbert added.
Security is also cultural. A company must patch their programs. Admins need to secure new devices before hooking them into the system. Information technology has to manage access levels through the business. One machine, left unsecured, could compromise the whole network, according to Hibbert.
“It’s a big problem, and in a lot of organizations it’s a missing security layer,” Hibbert concluded.
Watch the complete video interview below, and be sure to check out more of SiliconANGLE’s and theCUBE’s coverage of The Chertoff Group Security Series “Security in the Boardroom.” (* Disclosure: TheCUBE is a paid media partner for The Chertoff Group Security Series “Security in the Boardroom.” Neither The Chertoff Group LLC nor BeyondTrust Inc. have editorial control over content on theCUBE or SiliconANGLE.)