SlideShare a Scribd company logo
1 of 35
Download to read offline
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1
Protect Sensitive and
Critical Financial Data
with Privileged Access
Adam White l July 10, 2018
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2
• Cyber Breaches and the Finance Industry
• Leading Attack Pathways
• Survey Findings: 2018 Privileged Access
Threat Report
• Regulatory Requirements - Access +
Credentials
• Privilege Access Management – A Solution
(include use cases)
• Demo
• Q&A
• Additional Resources
Agenda
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3
• MONEY!
• Data, Data, Data
• Legacy security practices
• Legacy solutions
Why Financial
Organizations Are So
Attractive To Hackers
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4
“Actor motives have historically been driven by financial gain,
followed by strategic advantage aka espionage. Just under 90% of
breaches fall into these two motives, with money once again
leading the charge.”
2018 Data Breach Investigations Report, Verizon
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5
• Organizations are too trusting of insiders
and vendors
• The amount of sensitive data processed and
managed by financial institutions
• Cyber attacks today are more sophisticated
and well-funded given the increased value of
the compromised data on the black market
Risk Factors Affecting Financial
Cyber Security
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6
A Matter of Trust
2018 Privileged Access Threat Report, Bomgar
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7
A Matter of Trust
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8
In the
News
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9
In the News
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10
Stolen credentials leading the way…
2018 Data Breach Investigations Report, Verizon
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11
Cyber Breaches Show No Sign Of Slowing Down
• Targeted attacks on corporate IT networks have
increased in scale and public visibility
• Hacker objective = bypass perimeter security,
by stealing legitimate credentials to gain access
• Phishing tactics are increasingly sophisticated
and often involve social engineering
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12
The privileged access
threat landscape is growing
with a higher risk of
enabling cyberattacks and
severe consequences
Gartner, “Architecting Privileged Access Management
for Cyber Defense, March 12, 2018
“ “
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13
• The least privilege principle ensures a user account is provisioned with
minimum entitlements that are essential to perform its intended function
• Enforces general access control requirements across different environments
and platforms to eliminate unnecessary access for privileged users
Enforcing “Least Privilege” Reduces Attack Surface
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14
• Solutions that manage privileged
access cannot compromise the
user experience
• Adoption success is directly
impacted by the product’s ability to
support privileged users in
completing their job tasks
But “Least Privilege” Must Also Be Productive
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15
“We immediately saw that with Bomgar Privileged Access, we
could tighten our control over what privileged users could and
could not do, as well as audit their actions. It’s a far superior
approach than just giving them unrestricted VPN access.”
VP of IS&T, AMOCO Federal Credit Union
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16
Case Study – AMOCO Federal Credit Union
• Eliminated use of VPN’s for
vendor access
• Gained Control of Privileged
Access
• Improved Productivity
• Enhanced Security
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17
Support Users. Access Endpoints. Protect Credentials
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18
Bomgar Remote Support
SUPPORT MORE
More devices, more platforms, more people, more locations. Provide
instant remote support to end-users on or off your network using
Windows, Mac, iOS, Android and more.
PROVIDE SUPERIOR SERVICE
Improve service levels and customer satisfaction with seamless,
high-quality remote support for every end-user.
SECURE YOUR BUSINESS
Securing in remote access tools is crucial in protecting your network
from threats and meeting compliance regulations.
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19
Bomgar Privileged Access
PROTECT THE ACCESS
Enable role-based access to specific systems and define session
parameters, such as access timeframes, required approvals, and
permitted functions.
MANAGE ACTIVITY
Actively manage the ongoing operational use of network devices and
hardware on the network.
ANALYZE & AUDIT DATA
Understand what privileged users are actually doing within the
network and audit for misuse, while meeting audit trail requirements.
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20
Bomgar Privileged Identity
SEAMLESSLY INJECT CREDENTIALS
When integrated with Bomgar Privileged Access of Remote
Support, users can directly inject credentials into end servers
and systems without exposing plain text passwords.
ROTATE & DISCOVER AT SCALE
Rotate privileged identities at scale- up to thousands per minute- and
easily randomize local account passwords while continuously
detecting systems, devices and accounts as they come on and off
the network.
MANAGE SERVICE ACCOUNTS
Automatically discover service accounts and their dependencies- both
clustered and individual services- to achieve optimal system uptime.
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21
How Do You Secure
Privileged Users?
PRIVILEGED USER
CORPORATE NETWORK
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22
How Do You Secure
Privileged Users?
PRIVILEGED USER
CORPORATE NETWORK
✓Broker the connection
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23
How Do You Secure
Privileged Users?
PRIVILEGED USER
CORPORATE NETWORK
✓Outbound connections
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24
How Do You Secure
Privileged Users?
PRIVILEGED USER
CORPORATE NETWORK
✓Multifactor authentication
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25
How Do You Secure
Privileged Users?
PRIVILEGED USER
CORPORATE NETWORK
✓Access to specific systems
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26
How Do You Secure
Privileged Users?
PRIVILEGED USER
CORPORATE NETWORK
✓Application whitelist / blacklist
✓
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 27
How Do You Secure
Privileged Users?
PRIVILEGED USER
CORPORATE NETWORK
✓
✓Access timeframes
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 28
How Do You Secure
Privileged Users?
PRIVILEGED USER
CORPORATE NETWORK
✓
✓Access approval workflow
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 29
How Do You Secure
Privileged Users?
PRIVILEGED USER
CORPORATE NETWORK
✓
✓Full audit trail with video
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 30
Windows, Mac, Linux
SSH Telnet
iOS & Android Mobile
Amazon AWS
Microsoft Azure
Public Cloud
Private Cloud
VM Ware vSphere
Citrix XenServer
Microsoft Hyper-V
Traditional Systems
PCs, Servers etc.
Secure & Manage Access Across Hybrid
Environments
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 31
DEMO
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 32
But, Success Is Based On More Than
Features
“Usable Security”
• Is the product easy for
people to use?
• Does it make their jobs
easier, not harder?
Make “least privileged”
productive, not a
hindrance
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 33
• 2018 Privileged Access Threat
Report
• Bomgar Privileged Access
Management
• Seamless Credential Injection
• Bomgar Architecture for Secure
Access
• Bomgar Compliance Matrix
Additional Resources
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 34
Thank You
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 35
Questions?
Adam White l July 10, 2018
@Bomgar
#bomgarwebinar

More Related Content

What's hot

FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Alliance
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessForgeRock
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
Comply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsComply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsThycotic
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionFIDO Alliance
 
FIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO Alliance
 
FIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Alliance
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in GovernmentFIDO Alliance
 
BREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised CredentialBREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised CredentialThycotic
 
Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Greg Wartes, MCP
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationFIDO Alliance
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected WorldFIDO Alliance
 
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCWill O'Brien
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong AuthenticationFIDO Alliance
 
Keep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approachKeep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approachNagib Aouini
 

What's hot (20)

FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - feb
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Comply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsComply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed Audits
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
 
FIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government Requirements
 
FIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo JapanFIDO Authentication Account Recovery Framework at Yahoo Japan
FIDO Authentication Account Recovery Framework at Yahoo Japan
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
BREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised CredentialBREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised Credential
 
Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
 
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
 
Keep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approachKeep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approach
 

Similar to Protecting Sensitive and Critical Financial Data with Privileged Access

Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...SaaStock
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems Pvt. Ltd
 
Next generation access controls
Next generation access controlsNext generation access controls
Next generation access controlsTranscendent Group
 
Reducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained EnvironmentsReducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained EnvironmentsDenim Group
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfForgeRock
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, TooBomgar
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceCloudera, Inc.
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applicationsForcepoint LLC
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chZscaler
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmySolarWinds
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint e-Xpert Solutions SA
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...FinTechLabs.io
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Alliance
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTTechnofutur TIC
 
Establishing sustainable GDPR compliance
Establishing sustainable GDPR complianceEstablishing sustainable GDPR compliance
Establishing sustainable GDPR complianceCloudera, Inc.
 
Software Development & Testing Challenges in Finance & Banking
Software Development & Testing Challenges in Finance & BankingSoftware Development & Testing Challenges in Finance & Banking
Software Development & Testing Challenges in Finance & BankingAdam Sandman
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy managementTrustArc
 

Similar to Protecting Sensitive and Critical Financial Data with Privileged Access (20)

Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
 
Next generation access controls
Next generation access controlsNext generation access controls
Next generation access controls
 
Reducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained EnvironmentsReducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained Environments
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US Army
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
 
Establishing sustainable GDPR compliance
Establishing sustainable GDPR complianceEstablishing sustainable GDPR compliance
Establishing sustainable GDPR compliance
 
Software Development & Testing Challenges in Finance & Banking
Software Development & Testing Challenges in Finance & BankingSoftware Development & Testing Challenges in Finance & Banking
Software Development & Testing Challenges in Finance & Banking
 
2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management2019 09-26 leveraging the power of automated intelligence for privacy management
2019 09-26 leveraging the power of automated intelligence for privacy management
 

Recently uploaded

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 

Recently uploaded (20)

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 

Protecting Sensitive and Critical Financial Data with Privileged Access

  • 1. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Protect Sensitive and Critical Financial Data with Privileged Access Adam White l July 10, 2018
  • 2. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2 • Cyber Breaches and the Finance Industry • Leading Attack Pathways • Survey Findings: 2018 Privileged Access Threat Report • Regulatory Requirements - Access + Credentials • Privilege Access Management – A Solution (include use cases) • Demo • Q&A • Additional Resources Agenda
  • 3. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3 • MONEY! • Data, Data, Data • Legacy security practices • Legacy solutions Why Financial Organizations Are So Attractive To Hackers
  • 4. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4 “Actor motives have historically been driven by financial gain, followed by strategic advantage aka espionage. Just under 90% of breaches fall into these two motives, with money once again leading the charge.” 2018 Data Breach Investigations Report, Verizon
  • 5. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5 • Organizations are too trusting of insiders and vendors • The amount of sensitive data processed and managed by financial institutions • Cyber attacks today are more sophisticated and well-funded given the increased value of the compromised data on the black market Risk Factors Affecting Financial Cyber Security
  • 6. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6 A Matter of Trust 2018 Privileged Access Threat Report, Bomgar
  • 7. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7 A Matter of Trust
  • 8. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8 In the News
  • 9. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9 In the News
  • 10. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10 Stolen credentials leading the way… 2018 Data Breach Investigations Report, Verizon
  • 11. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11 Cyber Breaches Show No Sign Of Slowing Down • Targeted attacks on corporate IT networks have increased in scale and public visibility • Hacker objective = bypass perimeter security, by stealing legitimate credentials to gain access • Phishing tactics are increasingly sophisticated and often involve social engineering
  • 12. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12 The privileged access threat landscape is growing with a higher risk of enabling cyberattacks and severe consequences Gartner, “Architecting Privileged Access Management for Cyber Defense, March 12, 2018 “ “
  • 13. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13 • The least privilege principle ensures a user account is provisioned with minimum entitlements that are essential to perform its intended function • Enforces general access control requirements across different environments and platforms to eliminate unnecessary access for privileged users Enforcing “Least Privilege” Reduces Attack Surface
  • 14. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14 • Solutions that manage privileged access cannot compromise the user experience • Adoption success is directly impacted by the product’s ability to support privileged users in completing their job tasks But “Least Privilege” Must Also Be Productive
  • 15. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15 “We immediately saw that with Bomgar Privileged Access, we could tighten our control over what privileged users could and could not do, as well as audit their actions. It’s a far superior approach than just giving them unrestricted VPN access.” VP of IS&T, AMOCO Federal Credit Union
  • 16. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16 Case Study – AMOCO Federal Credit Union • Eliminated use of VPN’s for vendor access • Gained Control of Privileged Access • Improved Productivity • Enhanced Security
  • 17. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17 Support Users. Access Endpoints. Protect Credentials
  • 18. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18 Bomgar Remote Support SUPPORT MORE More devices, more platforms, more people, more locations. Provide instant remote support to end-users on or off your network using Windows, Mac, iOS, Android and more. PROVIDE SUPERIOR SERVICE Improve service levels and customer satisfaction with seamless, high-quality remote support for every end-user. SECURE YOUR BUSINESS Securing in remote access tools is crucial in protecting your network from threats and meeting compliance regulations.
  • 19. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19 Bomgar Privileged Access PROTECT THE ACCESS Enable role-based access to specific systems and define session parameters, such as access timeframes, required approvals, and permitted functions. MANAGE ACTIVITY Actively manage the ongoing operational use of network devices and hardware on the network. ANALYZE & AUDIT DATA Understand what privileged users are actually doing within the network and audit for misuse, while meeting audit trail requirements.
  • 20. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20 Bomgar Privileged Identity SEAMLESSLY INJECT CREDENTIALS When integrated with Bomgar Privileged Access of Remote Support, users can directly inject credentials into end servers and systems without exposing plain text passwords. ROTATE & DISCOVER AT SCALE Rotate privileged identities at scale- up to thousands per minute- and easily randomize local account passwords while continuously detecting systems, devices and accounts as they come on and off the network. MANAGE SERVICE ACCOUNTS Automatically discover service accounts and their dependencies- both clustered and individual services- to achieve optimal system uptime.
  • 21. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21 How Do You Secure Privileged Users? PRIVILEGED USER CORPORATE NETWORK
  • 22. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22 How Do You Secure Privileged Users? PRIVILEGED USER CORPORATE NETWORK ✓Broker the connection
  • 23. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23 How Do You Secure Privileged Users? PRIVILEGED USER CORPORATE NETWORK ✓Outbound connections
  • 24. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24 How Do You Secure Privileged Users? PRIVILEGED USER CORPORATE NETWORK ✓Multifactor authentication
  • 25. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25 How Do You Secure Privileged Users? PRIVILEGED USER CORPORATE NETWORK ✓Access to specific systems
  • 26. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26 How Do You Secure Privileged Users? PRIVILEGED USER CORPORATE NETWORK ✓Application whitelist / blacklist ✓
  • 27. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 27 How Do You Secure Privileged Users? PRIVILEGED USER CORPORATE NETWORK ✓ ✓Access timeframes
  • 28. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 28 How Do You Secure Privileged Users? PRIVILEGED USER CORPORATE NETWORK ✓ ✓Access approval workflow
  • 29. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 29 How Do You Secure Privileged Users? PRIVILEGED USER CORPORATE NETWORK ✓ ✓Full audit trail with video
  • 30. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 30 Windows, Mac, Linux SSH Telnet iOS & Android Mobile Amazon AWS Microsoft Azure Public Cloud Private Cloud VM Ware vSphere Citrix XenServer Microsoft Hyper-V Traditional Systems PCs, Servers etc. Secure & Manage Access Across Hybrid Environments
  • 31. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 31 DEMO
  • 32. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 32 But, Success Is Based On More Than Features “Usable Security” • Is the product easy for people to use? • Does it make their jobs easier, not harder? Make “least privileged” productive, not a hindrance
  • 33. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 33 • 2018 Privileged Access Threat Report • Bomgar Privileged Access Management • Seamless Credential Injection • Bomgar Architecture for Secure Access • Bomgar Compliance Matrix Additional Resources
  • 34. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 34 Thank You
  • 35. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 35 Questions? Adam White l July 10, 2018 @Bomgar #bomgarwebinar