Operationalizing Least Privilege

  • LANGUAGE: English DATE: Wednesday, November 04, 2020 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
Operationalizing Least Privilege A Pragmatic Approach to Balancing Security and Productivity

Striking the balance between enabling users and administrators to be productive whilst protecting your sensitive systems and data is becoming ever more challenging. Attackers are often one step ahead of organizations, and even those with the most comprehensive security systems and controls in place find that an attacker will discover and exploit their Achilles’ heel.

This webinar will provide practical steps to enable organizations to successfully implement industry recognized best practices and foundational security controls to secure IT systems and data against the most pervasive attacks. It will provide tips to successfully implement a strategy of least privilege, allowing you to eliminate unnecessary privileges and elevate rights across multi platforms and networked devices without hindering end-user productivity, firmly shutting the door on attackers.  

Join this webinar and learn 

  • To implement foundational security controls & best practices   
  • Practical steps to successfully deliver a least privilege strategy  
  • How to successfully balance security and productivity 

Paul Fisher, Senior Analyst at KuppingerCole, will introduce you to the concept of least privilege and how it helps to balance security and productivity effectively protect business assets and maintain operational efficiency. 

He will be joined by Karl Lankford, Director, Solutions Engineering at BeyondTrust who will provide tips to implement a least privilege strategy. 


Speakers

Paul Fisher is a Senior Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...

Karl Lankford is the Director, Solutions Engineering, for BeyondTrust, where he has worked for 5 years. A highly capable security leader, Karl has acquired a wide range of security experience and knowledge over the last decade, working across multiple industries. Karl is a regular speaker at...


Lead Sponsor

BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at: www.beyondtrust.com

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Finding Your Path to Zero Trust

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00