/* CSS to help with ACF styling */ #page-header .h1 {color: #444;} #page-header h2.text-color-xsdn-color {color: #444;}
/* CSS to help with ACF styling */ #page-header .h1 {color: #fff;} #page-header h2.text-color-xsdn-color {color: #fff;}
/* CSS to help with ACF styling */ #page-header .h1 {color: ;} #page-header h2.text-color-xsdn-color {color: ;}
/* CSS to help with ACF styling */ #page-header {background-color: #031ac3;}
/* CSS to help with ACF styling */ #page-header {background: #fff url() center center; padding-top: 0px; padding-bottom: 0px; } @media all and (max-width: 4699px) and (min-width: 1925px) { .title-and-subtitle-background-image { padding-top: 3% !important; padding-bottom: 3% !important; } }
/* CSS to help with ACF styling */ #page-header {background: ;}

FairWarning Executive Series Webinar

Salesforce power users hold the keys to your kingdom. They can make changes to whitelist IPs, permission sets and security controls, often going undetected under the veil of privileged access. Security-minded Salesforce admins understand that these power users can inadvertently or maliciously abuse their privileges to company resources and controls, putting your organization at extreme security risk. In fact, 80 percent of security breaches involve privileged user credentials, according to Forrester Research. So, who’s making sure the keys to your Salesforce kingdom are in the hands of the right power users? Strengthen your security posture with our strategies for preventing privileged user abuse in Salesforce and securing your org.

Download the slides

Executive Summary

Privileged users in Salesforce may be people at a keyboard, or they may be applications and interfaces interacting with your instance. Either way, they have higher levels of permission than the standard user.

Download the whitepaper

 

Privileged users hold the keys to your kingdom – including sensitive proprietary business and customer data. One misstep, either intentional or accidental, could devastate your organization. In fact, 80 percent of security breaches involve privileged user credentials, according to Forrester. But how do you know who they are — or keep track of what they’re doing within Salesforce?

In this webinar, Mark Bowling, Chief Security Officer of United Capital Financial Partners, and LaDon Williams, Information Security Analyst at FairWarning, discuss the issue of privileged users in your Salesforce instance and the risks they can pose to your organization.

They also reveal how they’re approaching the issue of privileged user abuse in Salesforce at their respective organizations, and best practices for managing Salesforce user access.

You’ll learn how to:

  • Identify your Salesforce privileged users and what they have access to.
  • Implement key security controls, policies, and procedures that improve your compliance posture and secure your data (and that of your customers), specifically with regards to GDPR and ISO 27001.
  • Provide the right permissions to the right users to minimize your attack surface.
  • Detect unusual behaviors, such as a larger-than-average export of data by a specific user, a login from a suspicious location, or access by an unauthorized application.
  • Develop an appropriate incident or breach response plan in the event that data is compromised within Salesforce, and perform forensic investigations in response to law enforcement, regulatory, or e-discovery requests.

“Minimizing your human attack surface is every bit as important as minimizing your technical attack surface.”

Bowling also discusses:

  • How United Capital created a culture of compliance and security to drive risk out of their organization and keep company and customer information safe.
  • What GDPR says about privileged access, and which specific ISO 27001 controls United Capital has implemented to strengthen its compliance, security, and privacy posture.
  • How United Capital created an internal control framework to assess their risk mitigation efforts reduce the incidence of security incidents or breaches.
  • How United Capital determines whether unauthorized changes are being made or whether data is being accessed or handled improperly within Salesforce.

Watch the replay to learn more about how these security professionals are detecting, investigating, mitigating, and remediating privileged user abuse in Salesforce.

Related content:

Secure the Keys to Your Kingdom: Protect Your Organization’s Privileged User Accounts
5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud
5 Ways to Prevent Privileged User Abuse in the Cloud


Speakers

Mark Bowling

Chief Security Officer
United Capital

Mike Mason

Sr. Product Marketing Manager
FairWarning

LaDon Williams

Information Security Analyst
FairWarning

RELATED LEARNING CENTER

  • FairWarning Mapping to ISO IEC 27001
    Learn More
    Data Sheet
    ISO/IEC 27001 Mapping Guide
  • Memorial Healthcare
    Learn More
    Executive Series Webinar
    Memorial Healthcare’s Privacy and Security Comeback: From Reported Breach to Patient Privacy Excellence
  • Preventing Privileged User Abuse in the Cloud
    Learn More
    White Paper
    Preventing Privileged User Abuse in Salesforce