Privileged Access Management – Made Tangible by Concrete Analogies
- TYPE: Workshop DATE: November 12, 2019 TIME: 13:00 - 18:00
Imagine you are a service technician and your next job is to fix the air conditioner in a bank director's office. Would you be surprised if the janitor gave you the master key and lets you make your way without surveillance? We guess so!
Actually this is common practice, experienced regularly by IT service personnel. How can it be that well-proven security measures from the “real world” are being translated so slowly and inconsequently into the virtual IT equivalents? In spite of the fact that common sense and also regulatory compliance necessitate the same!
This workshop will cover the complete functional range of ARCON Privileged Access Management, based on analogies like doors, locks, tokens, access authorizations, surveillance cameras etc. Two groups of participants will interactively play through real and virtual examples – one being the potential violator, the other being the protector. In the end you will have a clear understanding, where to look for vulnerabilities and how to remediate.
When are we talking about privileged access?
Why does it matter?
Definition of the baseline situation
The daily routine in the hospital as an example. However, the scenario can be applied to other industries.
Definition of protection goals
Which protection goals are most important?
Privileged access in real world scenarios
Real world example – Interactive session violators vs. protectors
Coffee Break - 15:00 - 15:30
Privileged access in virtual world scenarios
Virtual world example – Interactive session violators vs. protectors
Analogies between the real and the virtual world
How can the protection goals be achieved?