CyberArk to Present Pass-the-Hash Vulnerability Data at Black Hat

August 5, 2014

Session will Explore the Privilege Account Security Threat and Highlight Network Exposure

Newton, Mass. – August 5, 2014 – CyberArk, the company securing the heart of the enterprise, today announced that Andrey Dulkin, senior director of cyber innovation, will present “Pass-the-Hash: Actual Threat or a Negligible Technique,” during the Black Hat Conference. The session will explain how advanced attacks leverage this Windows vulnerability to exploit privileged accounts, enabling attackers to maneuver throughout an organization’s network and gain access to critical data. Dulkin will use real-world data to demonstrate the significance of the risk unprotected hashes pose for an organization.

Who: Andrey Dulkin, senior director of cyber innovation, CyberArk

What: “Pass-the-Hash: Actual Threat or a Negligible Technique”

Lately, concerns regarding Pass-the-Hash and other credential theft and abuse techniques have risen, but there is little real-world data available on the threat exposure to networks. This session will demonstrate this attack along with data collected from multiple real-world networks. Attendees will learn where hashes reside, what percentage of accounts threaten machines on the network, how many steps it typically takes an attacker to get from machine to machine and more. Dulkin’s statistical analysis will be of interest both for ethical hackers, in understanding the networks that they test, and security officers, in enabling them to better prioritize and focus their efforts.

When: Thursday, August 7, 2014, 3:30 p.m.

Where: Business Hall Theater A, Mandalay Bay, Las Vegas

Twitter: @CyberArk

In addition, at booth #140, CyberArk will run demonstrations of its Privileged Threat Analytics™ solution. The demonstrations will be set up to engage attendees to monitor privileged account activity, find the security anomaly and eliminate the threat to the system.

For more information on Pass-the-hash vulnerabilities, please visit

To view a video introduction to CyberArk Privileged Threat Analytics, please visit: