Facebook Twitter LinkedIn

PxM

Expert Talk
Wednesday, May 16, 2018 14:30—15:30
Location: WINTER GARDEN

The 5 Deadly Sins of Privileged Access Management

For years, security experts have outlined the best practices for privileged access management in an effort to reduce problems associated with the abuse of privileged credentials. Despite this, IT organizations continue to struggle with privileged access management. Take a look inside any large enterprise and you’ll likely find that passwords are still not under complete control, users with administrator privileges are still causing problems and far too many system vulnerabilities open pathways to privileged accounts.

BeyondTrust conducted a Privileged Access Management survey. Having analysed the results, we’ve compiled a list of the Five Deadly Sins of Privileged Access Management. Think our title is too dramatic? Consider this: These five deadly sins cost the typical enterprise nearly $4M annually resulting from lost productivity, costs to mitigate incidents and legal or compliance issues. Join this session to learn more about those five deadly sins and how to rectify them.

Brian Chappell
Brian Chappell
BeyondTrust
Brian Chappell is Deputy Chief Technology Officer at BeyondTrust. Brian has more than 30 years of IT and cybersecurity experience in a career that has spanned system integrators, PC and Software...

Best Practice in Privileged Access Management

In a time of rapid digital transformation, a lot of organizations face challenges managing privileged accounts. To strictly control, protect, monitor, and manage them, such companies use Privileged Account Management (PAM).

Typical stipulations for the handling of privileged identities and users as well as accounts can be found in industry-specific standards as well as in regulations and laws. Stricter legal regulations and regulatory standards require aggregation of data and event management information. These require the ability to identify and eliminate internal threats that can arise from the misuse of privileged user rights.

Companies must increasingly be in a position to provide privileged access on demand (Least Privileges / Need-to-Know) in a secure way: Based on specific roles. This is the principle of the least privileged rights: access to the right resources at the right times and for the right reasons.

Key Takeaways:

Best Practice in Privileged Access Management
Presentation deck
Best Practice in Privileged Access Management
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Helmut Brachhaus
Helmut Brachhaus
PATECCO
Helmut Brachhaus is Chief Technology Officer and Senior IAM Consultant at PATECCO, with a focus on Privileged Account Management, as well. He looks back on nearly 25 years of experience in...

Reducing Downtimes While Increasing Security in Industrial Systems with PAM

The most interesting topic for plant managers and industry responsible are how to reduce downtime and how to protect industry systems for attacks.

In this presentation we will go through hints how PAM (Privileged Access Management) solution can help to reduce downtimes of industry machines while increasing the whole security. PAM as an alternative to VPN and older remote access solutions.

Reducing Downtimes While Increasing Security in Industrial Systems with PAM
Presentation deck
Reducing Downtimes While Increasing Security in Industrial Systems with PAM
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Markus Westphal
Markus Westphal
Wallix
Markus Westphal brings in 15 years of experience from different leading IT security vendors. Before joining WALLIX he led several international vendors to the road of success in DACH. He held...
Subscribe for updates
Please provide your email address