Access Management , Identity & Access Management , Next-Generation Technologies & Secure Development

Changing the Conversation About Privileged Access

Scott Walker of Bomgar on New Ways to Prioritize Access Management
Scott Walker, solutions engineer, Bomgar Corp.

Recent research from Forrester finds that 80 percent of breaches involve the exploitation of privileged access. Several high-profile breaches, including those affecting Anthem, Sony and Home Depot, are examples of incidents where a criminal took advantage of privileged credentials to illegally gain access to a corporate system.

See Also: Why Credentials Are 'The New Perimeter'

Managing privileged access is a much bigger and more complex job today than it was even just a few years ago, says Scott Walker, a Solutions Engineer (EMEA) at Bomgar Corp., who advises security professionals to be mindful of the components that are at play in employee as well as third-party access as the reliance on vendors continues to grow.

In an interview at Information Security Media Group's recent Fraud and Breach Prevention Summit in London, Walker discusses:

  • Why the concerns around privileged access have changed in recent years;
  • Tips for addressing the different needs of varying levels of access;
  • Thoughts on locking down third-party vendor access.

Walker is a solutions engineer for Bomgar. He formerly worked at Kaspersky Lab and has a decade of experience in the field.


About the Author

Joan Goodchild

Joan Goodchild

Director of Multimedia Content, ISMG

Joan Goodchild is veteran writer and editor who has been covering security for more than a decade. Before joining ISMG, she was the editor-in-chief of CSO, where she led the team to several national awards, including an AZBEE (ASPBE) for website of the year and several Digital Eddie (Folio) awards for B2B website of the year. Her previous experience in business journalism includes roles as a broadcast and web editor with the Boston Business Journal and as a news writer covering the Windows OS with TechTarget. Prior to that, she worked as a television reporter and anchor for more than a decade. She has a master's degree in journalism from Northwestern University's Medill School of Journalism and is the recipient of an Edward R. Murrow award for investigative reporting.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.