Privileged users can pose a risk to organizations, given their high level of permissions. In cloud applications, this means a broader attack surface. It could mean a greater insider threat. It could also mean more targets for external attackers trying to steal or compromise credentials.
This infographic summarizes the privileged user landscape, including who privileged users are, the risk they pose, and ways to better manage your privileged user ecosystem.