- TYPE: Expert Talk DATE: Wednesday, May 16, 2018 TIME: 14:30-15:30 LOCATION: WINTER GARDEN
For years, security experts have outlined the best practices for privileged access management in an effort to reduce problems associated with the abuse of privileged credentials. Despite this, IT organizations continue to struggle with privileged access management. Take a look inside any large enterprise and you’ll likely find that passwords are still not under complete control, users with administrator privileges are still causing problems and far too many system vulnerabilities open pathways to privileged accounts.
BeyondTrust conducted a Privileged Access Management survey. Having analysed the results, we’ve compiled a list of the Five Deadly Sins of Privileged Access Management. Think our title is too dramatic? Consider this: These five deadly sins cost the typical enterprise nearly $4M annually resulting from lost productivity, costs to mitigate incidents and legal or compliance issues. Join this session to learn more about those five deadly sins and how to rectify them.
In a time of rapid digital transformation, a lot of organizations face challenges managing privileged accounts. To strictly control, protect, monitor, and manage them, such companies use Privileged Account Management (PAM).
Typical stipulations for the handling of privileged identities and users as well as accounts can be found in industry-specific standards as well as in regulations and laws. Stricter legal regulations and regulatory standards require aggregation of data and event management information. These require the ability to identify and eliminate internal threats that can arise from the misuse of privileged user rights.
Companies must increasingly be in a position to provide privileged access on demand (Least Privileges / Need-to-Know) in a secure way: Based on specific roles. This is the principle of the least privileged rights: access to the right resources at the right times and for the right reasons.
- Establish a policy that specifies how privileged accounts are managed and what is allowed and not allowed to the owners of the account
- Integrate this policy into a security management framework. This framework defines those responsible for ensuring that security management policies are adhered to.
- Systematic and consistent inventory of privileged accounts.
- Implement a complete audit record (Trail) that ensures the following:
- Access details
- Activities carried out
The most interesting topic for plant managers and industry responsible are how to reduce downtime and how to protect industry systems for attacks.
In this presentation we will go through hints how PAM (Privileged Access Management) solution can help to reduce downtimes of industry machines while increasing the whole security. PAM as an alternative to VPN and older remote access solutions.
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 15 - 18, 2018 Munich, Germany
The European Identity & Cloud Conference 2018 is proud to present a large number of partners
How can we help you