Artwork
iconShare
 
Manage episode 515896805 series 3653744
Content provided by David Spark and CISO Series. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Spark and CISO Series or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

All links and images can be found on CISO Series.

Identity has become the Gordian knot of cybersecurity. Threat actors no longer need to break in. They log in. As organizations manage increasingly complex ecosystems spanning cloud, on-premises, and hybrid environments, the challenge isn't just understanding who has access to what. It's about understanding how an attacker could chain together seemingly innocent permissions to escalate from an initially compromised user to full environment control.

The problem is compounded by privilege creep, where employees accumulate access over time as roles change and exceptions pile up without systematic review. Traditional security tools excel at protecting identities at rest or governing access for individual users. Still, they often miss the needle in the haystack: the cascading attack paths that adversaries actively exploit.

In this episode, Justin Kohler, chief product officer at SpecterOps, explains how Bloodhound Enterprise addresses these challenges by proactively uncovering and eliminating attack paths before adversaries can exploit them, transforming abstract permissions into visual maps that show precisely how attackers could move through your environment. Joining him are Angela Williams, SVP and CISO at UL Solutions, and Brett Conlon, CISO at American Century Investments.

Want to know:

  • Why does identity security remain such a persistent challenge for organizations?
  • What attack path management actually does versus traditional identity governance tools?
  • How does Bloodhound Enterprise complement other solutions in your stack?
  • How to visualize and prioritize the attack paths that matter most?
  • What emerging identity-based threats should CISOs prioritize over the next 12 months?
  • How has the definition of "identity" evolved beyond just human users?
  • Can continuous attack path mapping keep pace with dynamic cloud environments?

Huge thanks to our sponsor, SpecterOps

SpecterOps' 2025 State of Attack Path Management report reveals how technical debt transforms into identity risk and provides actionable strategies for security teams. Drawing insights from the creators of BloodHound, this report outlines proven methods for strengthening identity directory security to prevent costly breaches. Learn more at https://specterops.io/.

  continue reading

37 episodes