Privileged Access Management 101
What Hackers Really Think
About Your Cyber Defenses
17,000 Security Professionals
BLACK HAT CONFERENCE 2018
Google’s Security Princess
delivering the Keynote
Detecting Credential Compromise in
AWS
From Workstation to Domain Admin
“So I Became a Domain Controller”
Privileged Access Management 101
What Hackers Really Think
About Your Cyber Defenses
50% of
Hackers
Easily
Conquered
Windows OS in
the Past Year
Windows 10 27%
Windows 8 22.5%
BASED ON SURVEY QUESTION:
Which OS did you conquer the
most in the past 12 months?
Less than 5% of hackers listed Mac OS,
Unix, and Mobile devices as
compromised.
Also identified as easily conquered:
Linux OS 18%
say traditional perimeter security
firewalls and antivirus are irrelevant
or obsolete
73%
OF HACKERS SAY
56% of
Hackers say
Social
Engineering is the
fastest way to
access privileged
accounts
Social Engineering 56%
Application/
OS Vulnerability 20%
Identity Theft 10%
Malware,
Stolen Endpoints <7%
BASED ON SURVEY QUESTION:
What’s the fastest way to get
onto a network to access
privileged accounts?
Phishing Scams
Not an
attachment
but hyperlink
Password
Re-Use
is the riskiest
behavior by
employees
Re-used passwords 47%
Using USB drives
Without scanning 20%
Access via public wifi 19%
Malware,
Stolen Endpoints <7%
BASED ON SURVEY QUESTION:
What’s risky behavior do you
exploit the most?
91% of
Hackers
Conquer Windows
Environments
Despite Using
Group Policy
Objects
Yes, using Mimikatz 43%
Yes, easily 26%
Yes, passwords in SYSVOL
& Group Policy Preferences 22%
BASED ON SURVEY QUESTION:
Do you exploit companies
using Microsoft GPO?
Default Vendor
Passwords
Allow Hackers
to Escalate
Privileges
Default vendor passwords 22%
App/OS vulnerabilities 20%
Misconfigured service Accts 18%
Social Engineering 17%
Shared accounts 12%
Brute force 7%
BASED ON SURVEY QUESTION:
What is the single best way to
typically escalate privileges?
Domain Admin
Accounts
Allow Hackers
to RULE the
Network
Domain administrator 25%
Service account 19%
Root account 19%
BASED ON SURVEY QUESTION:
What is the primary type of
privileged account that you
prefer to target and stay hidden?
accessing privileged accounts was the
number one choice for the easiest and
fastest way to get at sensitive data
32%
OF HACKERS SAY
1. Adopt a zero trust posture
2. Don’t rely only on GPO for security
3. Apply the principle of Least Privilege
Black Hat 2018 Report Key Takeaways
ü Reduces Costs: Saves companies time and money
ü Empower Happy Employees: Reduce employee cyber
fatigue
ü Positive Security Impact
ü Fast Track to Compliance: Automation and reduced
complexity
ü Keeps Cyber Criminals Out
PAM: #1 Project in 2018
Ask Advice
Click Here
A Secure Internet
Starts With You
QUESTIONS
Thycotic prevents cyberattacks by securing
passwords, protecting endpoints, and controlling
access
10,000+
Customers
180,000
IT Admins &
Security Pros
1M+
Endpoints
Protected

2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyber Defenses