Privileged Access Management
Facebook Twitter LinkedIn

Privileged Access Management

Combined Session
Thursday, October 10, 2019 13:00—14:00
Location: Ballroom

The Journey Towards a Passwordless Enterprise

Everyone knows that the password is dead, yet most companies are still struggling with them. With such a broad choice of strong authentication products on the market, what can possibly prevent their broader adoption?

If you are still thinking about finding the right balance between security and user experience, you’re doing it wrong. Even more, if you are still thinking about password replacement as just a matter of introducing strong authentication into your company, you really need to take a step back and see the big picture.

Going passwordless is a journey that requires a holistic strategy that incorporates not just user authentication, but expands to machine-to-machine communications as well – both for smart IoT devices as well as for legacy systems which are stuck with passwords for the rest of their lifecycle.

In this session, we’ll go beyond MFA into the realms of adaptive authentication, dynamic authorization, privileged access management and even cryptographic key management to dispel a few myths and outline the basic requirements for a comprehensive enterprise-wide passwordless strategy.

The Journey Towards a Passwordless Enterprise
Presentation deck
The Journey Towards a Passwordless Enterprise
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Alexei Balaganski
Alexei Balaganski
KuppingerCole
Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API...

How to Move from Always-on Privileged Access to Just-in-Time Administration and Drastically Reduce Your IT Security Risk

A true least-privilege security model requires users, processes, applications, and systems, to have just enough rights and access—and for no longer than necessary—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited part of the equation. Today, powerful accounts with always-on (24x7) privileged access proliferate across enterprises. The privileges of these accounts are always in an active mode—for both legitimate use and misuse. Just in Time (JIT) Administration is an approach in which organizations dynamically assign privileges to accounts and assets to ensure identities only have the appropriate privileges when necessary, and for the least time necessary. With JIT PAM, your admin privileges are no longer always ripe for abuse, so the threat window is drastically condensed. For example, a typical always-on privileged account may be “privilege-active” 168 hours a week, versus just a couple dozen minutes using a JIT approach. Multiplying this effect across all your privileged accounts will have a truly massive impact on risk-reduction. Adopting JIT as part of your PAM approach means you can implement a true least privilege model across your enterprise.

Key takeaways: 

Attend this session to gain a firm understanding of how to:
• Significantly condense your organization’s threat surface by shifting from an always-on privileged access model to a JIT approach
• Identify use cases where JIT PAM is an absolutely necessity
• Choose and implement JIT PAM triggers, methodologies, and workflows that will immediately help you to drive down risk enterprise-wide
• Benefit from the integration between BeyondTrust PAM solutions and Identity Governance solutions to identify and reduce security risks across all your endpoints

How to Move from Always-on Privileged Access to Just-in-Time Administration and Drastically Reduce Your IT Security Risk
Presentation deck
How to Move from Always-on Privileged Access to Just-in-Time Administration and Drastically Reduce Your IT Security Risk
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Morey J. Haber
Morey J. Haber
BeyondTrust
Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three Apress books: Privileged...

Tickets

CyberNext Summit & Borderless Cyber
€700
€1000
 
All days: Oct
Two day ticket
€550
€750
 
Day 1 + Day 2
€550
€750
 
Day 2 + Day 3
€550
€750
 
Day 1 + Day 3
€550
€750
 
One day ticket
€300
€500
 
Day 1
€300
€500
 
Oct
Day 2
€300
€500
 
Oct
Day 3
€300
€500
 
Oct
CyberNext Summit & Borderless Cyber - Gov. rate
€360
 
Government rate, All days: Oct
Two day ticket - Gov. rate
€295
 
Day 1 + Day 2
€295
 
Day 2 + Day 3
€295
 
Day 1 + Day 3
€295
 
One day ticket - Gov. rate
€230
 
Day 1
€230
 
Oct
Day 2
€230
 
Oct
Day 3
€230
 
Oct
Have you participated in our events?
Contact us to get a special discount
Subscribe for updates
Please provide your email address