Operationalizing Least Privilege
- LANGUAGE: English DATE: Wednesday, November 04, 2020 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Striking the balance between enabling users and administrators to be productive whilst protecting your sensitive systems and data is becoming ever more challenging. Attackers are often one step ahead of organizations, and even those with the most comprehensive security systems and controls in place find that an attacker will discover and exploit their Achilles’ heel.
This webinar will provide practical steps to enable organizations to successfully implement industry recognized best practices and foundational security controls to secure IT systems and data against the most pervasive attacks. It will provide tips to successfully implement a strategy of least privilege, allowing you to eliminate unnecessary privileges and elevate rights across multi platforms and networked devices without hindering end-user productivity, firmly shutting the door on attackers.
Join this webinar and learn
- To implement foundational security controls & best practices
- Practical steps to successfully deliver a least privilege strategy
- How to successfully balance security and productivity
Paul Fisher, Senior Analyst at KuppingerCole, will introduce you to the concept of least privilege and how it helps to balance security and productivity effectively protect business assets and maintain operational efficiency.
He will be joined by Karl Lankford, Director, Solutions Engineering at BeyondTrust who will provide tips to implement a least privilege strategy.
BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at: www.beyondtrust.com
The purpose of an identity management system is to support access control to an organization’s sensitive systems and protected resources. Contemporary access control has progressed from static entitlements, still used in many organisations. Not only manual interventions are necessary to change roles, also provisioning, reconciliation, recertification and auditing are laborious tasks, which complicate each business process.
The European Identity & Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.