Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Banking Awards
    • Banking Innovation Awards
    • Digital Banking Awards
    • Finance Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    • Financial Awards
    • Private Banking Awards
    • Private Banking Innovation Awards
    • Retail Banking Awards
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Technology
    3. >Understanding and Managing Identity Risk
    Technology

    Understanding and Managing Identity Risk

    Published by Jessica Weisman-Pitts

    Posted on April 12, 2022

    7 min read

    Last updated: February 7, 2026

    Add as preferred source on Google
    A top view of crossword puzzle blocks symbolizing the complexities of identity risk in cybersecurity, crucial for managing threats in banking and finance.
    Crossword puzzle blocks on a table representing identity risk in cybersecurity - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Global Banking & Finance Awards 2026 — Now Open for Entries
    Tags:cybersecurityrisk managementfinancial services
    Global Banking & Finance Awards 2026 — Call for Entries

    By Wade Lance, Field CTO at Illusive

    Nation-state sponsored advanced persistent threats (APTs) and financially motivated ransomware gangs might have different agendas, but there is one common denominator that characterises these news headline grabbing cyberattacks in recent years: the exploitation of identity risk. Despite this, organisations still lag when it comes to managing this crucial piece of the security puzzle.

    One of the reasons why identity risk is so hard to manage is that it is continuously and accidentally created by day-to-day IT operations. It is a natural byproduct of the processes that need to happen for an enterprise to run, but it is also the number one attack vector for threat actors, so much so that as many as 79% of organisations have experienced an identity breach in 2021. Unmanaged, misconfigured and exposed identity risk are incredibly ubiquitous, and can be found in as many as one in six corporate endpoints, even when there is an IAM (Identity Access Management) solution in place.

    These vulnerable endpoints are exactly what attackers know to look for to gain a foothold into the corporate network and then proceed to escalate privileges to reach the assets they are after. Even the world’s largest financial service providers, retailers, and healthcare providers, who have mature cybersecurity and risk management programs and dispose of advanced tools, remain vulnerable to identity risk. It is a visibility issue – much like how organizations need vulnerability scanning to discover vulnerable applications and devices, yet enterprises are unable to control such a dynamic entity as identity.

    Unmanaged Identity Risk

    Local admins may be unknown to identity management systems, local admin passwords may be outdated (or, in some cases, never set in the first place), and temp or test admin accounts are all examples of unmanaged identity risk.

    Each of these could allow an attacker to elevate their privileges to gain control of a domain, often without triggering any sort of alert. After all, if the malicious account used to move through the network is legitimate, then why should threat detection systems flag its behaviour as suspicious?

    What’s most worrying is that, according to a recent report, as many as 87% of local admins are not enrolled in a privileged account management (PAM) solution, despite having access to high level systems and processes. The disregard for basic identity security practices is also reflected by the fact that nearly 1 in 5 local admins are using passwords that are older than five years.

    Basic cybersecurity hygiene dictates that admin passwords should be changed every 90 days, but if an admin account isn’t enrolled in a PAM solution, there is no way for IT and security teams to know that these privileged accounts exist, let alone that their password hasn’t been changed. Attackers know of this visibility issue. APT38, a division of the North Korean Lazarus Group, is an example: knowing that organisations still struggle with password security, they initiate their financially motivated campaigns with brute force attacks that rely on poor password hygiene to work.

    Shadow Admins: What is Misconfigured Identity Risk?

    On top of unmanaged identity risk, enterprises also need to account for what we call “shadow admins.” Just like shadow IT systems are deployed beyond the visibility of the central IT department, shadow admins are those identities that are provisioned or granted higher privileges outside the visibility of IT teams. This happens unintentionally, usually for the sake of speeding up operations.

    One such example could be an employee that is promoted or transferred out of the IT department, but has created privileged users with their account – they would still have control over these privileged users, despite no longer serving as an admin. This happens more often than IT teams would like to believe and could result in a destructive breach. Should an attacker get access to this sort of account, they could easily escalate privileges and reach domain admin.

    In as many as 40% of the cases, these shadow admins could be exploited in one step, meaning that an attacker is literally one password reset away (or any other number of other simple admin actions) from reaching domain admin. In 10% of the cases, shadow admins already have Domain Admin privileges, making them a low hanging fruit for attackers who can just run automated discovery tools to identify and exploit them.

    Best practice guidelines exist, and all admin accounts should be created by being added directly to a privileged group. The reason why this doesn’t happen is that often IT teams lack the visibility they need, both in awareness of user privileges and their activity. It’s also true that the entropy of an Active Directory increases with use, as employees will always find the path of least resistance to complete their day to day tasks.

    Passwords on a sticky note: Exposed Identity Risks

    Employees will save cached credentials, store them in-app, in OS password stores, and in disconnected or “hanging” remote desktop protocol (RDP) sessions, leaving them exposed and vulnerable to exploitation. These practices are common and are difficult to track for IT teams. They are the equivalent of keeping track of passwords by writing them on a sticky note and leaving it on the office desk, but they are much worse in that – unlike a sticky note – these can be accessed and compromised remotely.

    Exposed identities aren’t just those of regular users – privileged account passwords are left exposed on 13% of endpoints. Each of these exposed credentials can cause a full-fledged ransomware attack, as an attacker could easily reach sensitive servers and gain access to an organisation’s crown jewels. Attackers even go as far as to steal these credentials and then sell them for a profit: RDP and VPN credentials are the most common and valuable access listing available on darknet and ransomware forums.

    Despite the pervasiveness of exposed credentials, remediating the risk they pose is very straightforward – it is just a matter of removing the credentials from the endpoint. The problem is always one of visibility: organisations don’t know that these privileged credentials have been improperly stored, therefore they don’t take the necessary steps for cleaning up their endpoints.

    The answer: automated, continuous discovery and mitigation

    It’s one of the mantras in security that organisations “can’t protect what they don’t know exists,” and this is especially true when it comes to identity risk. Unmanaged, misconfigured and exposed identities often overlap and intersect, with misconfigured admin credentials being left exposed and actively exploitable.

    The challenge for security teams is precisely one of visibility: they need to be aware of the identity risk in their environment in order to be able to mitigate it. Some organisations chose to do annual audits and red team exercises, which are useful to a certain extent, but won’t certainly cover today’s dynamically changing attack surface.

    For this reason, the same approach should be taken to managing identity risk as many organisations take to managing vulnerabilities, which is to continuously scan the entire surface. Much like in vulnerability management the scans are run automatically, and alerts are raised to indicate that an issue has been found, security teams need the help of automation to maintain ongoing visibility over the number one attack vector: identities.

    Frequently Asked Questions about Understanding and Managing Identity Risk

    1What is identity risk?

    Identity risk refers to the potential for unauthorized access to sensitive information or systems due to mismanagement or exposure of user identities.

    2What is a privileged account management (PAM) solution?

    A privileged account management (PAM) solution is a security tool designed to manage and monitor access to critical systems by users with elevated privileges.

    3What are shadow admins?

    Shadow admins are user accounts that have been granted administrative privileges without proper oversight, often leading to security vulnerabilities.

    More from Technology

    Explore more articles in the Technology category

    Image for The Data Intelligence Gap: Why Precision Is Becoming Critical in Enterprise Sales
    The Data Intelligence Gap: Why Precision Is Becoming Critical in Enterprise Sales
    Image for How Data Observability Is Evolving in Financial Services
    How Data Observability Is Evolving in Financial Services
    Image for When Is a Dedicated Server the Right Choice for Your Business?
    When Is a Dedicated Server the Right Choice for Your Business?
    Image for Enter Now for Best IT/Technology Recruitment Agency 2026
    Enter Now for Best IT/Technology Recruitment Agency 2026
    Image for The Rise of Intelligent Automation: How Technology Is Redefining Work and Efficiency
    The Rise of Intelligent Automation: How Technology Is Redefining Work and Efficiency
    Image for How Automation Technologies Are Transforming Everyday Business Operations
    How Automation Technologies Are Transforming Everyday Business Operations
    Image for Asprofin Bank Announces Financing Initiative for Modular ‘Nanocenter’ Data Infrastructure
    Asprofin Bank Announces Financing Initiative for Modular ‘Nanocenter’ Data Infrastructure
    Image for Basel IV vs. The AI Bots: Why the Banking Rulebook Must Evolve in the Age of Algorithmic Herding
    Basel Iv Vs. The AI Bots: Why the Banking Rulebook Must Evolve in the Age of Algorithmic Herding
    Image for NordQuant Deploys Distributed Systems to Enhance Enterprise Digital Capabilities Introduction
    NordQuant Deploys Distributed Systems to Enhance Enterprise Digital Capabilities Introduction
    Image for Calling Entries for Data Center Deal of the Year 2026
    Calling Entries for Data Center Deal of the Year 2026
    Image for Nominations Now Open for Best Website Design Company 2026
    Nominations Now Open for Best Website Design Company 2026
    Image for Call for Entries: Best Digital Innovation Company (Non-Financial / Cross-Industry) 2026
    Call for Entries: Best Digital Innovation Company (Non-Financial / Cross-Industry) 2026
    View All Technology Posts
    Previous Technology PostCommunication Is Key as Strong Customer Authentication Rules Come Into Force
    Next Technology PostWhy Buy Now, Pay Later and Cryptocurrency Must Be in the Payments Playbook