PAW DEPLOYMENT PAIRS WILL WITH NETWORK SEGMENTATION
29
NETWORK SEGMENTATION (LAYER3)
30
FURTHER LIMITING EXPOSURE TO CREDENTIAL THEFT AND LATERAL MOVEMENT
31
CLOSING
32
QUESTIONS/CONTACT
Description:
Explore a comprehensive conference talk on deploying Privileged Access Workstations (PAWs) as a strategy to mitigate credential theft and lateral movement in network security. Delve into various Windows authentication mechanisms, credential storage methods, and common attack scenarios. Learn about the Active Directory Administrative Tier Model, logon restrictions, and traditional jump server solutions. Discover the prerequisites, deployment phases, and models for implementing PAWs, including detailed guidance on setting up Active Directory frameworks, GPOs, and user policies. Gain insights into multi-factor authentication, Protected Users group, and lessons learned from real-world deployments. Understand how PAW implementation complements network segmentation strategies and further limits exposure to security threats. Conclude with practical tips and a Q&A session to enhance your organization's security posture against credential-based attacks.
Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement