IDM in dezentralen Unternehmen: Herausforderungen und Lösungsansätze

  • TYPE: Combined Session DATE: Thursday, November 14, 2019 TIME: 14:00-15:00 LOCATION: Caroline & Wilhelm
Track

Sessions:

Nutzerkonten mit erweiterten Berechtigungen sind ein lohnenswertes Ziel für Hacker schlechthin. 62% aller Datenschutzverletzungen im Jahr 2017 erfolgte durch Identitätsdiebstahl (IANS Research).

Lohnenswerte Ziele für Angreifer sind neben Netzwerk-Administratoren auch lokale Admins (Ransomware!) Entwickler, Zulieferer, externe Dienstleister, Service Provider, etc. da diese über einen direkten Zugang in die interne Infrastruktur eines Unternehmens verfügen. Eines darf man nicht vergessen: „Ein gekaperter privilegierter Account ermöglicht legale Zugriffe und Aktionen durch eine fremde Person.“ Bei erfolgreichem Identitätsdiebstahl befindet sich der Angreifer also bereits im internen System – und kann von dort aus verhältnismäßig einfach in die wirklich unternehmenskritischen Zonen vordringen.

Mit der WALLIX Bastion bietet WALLIX eine europäische, zertifizierte Privileged Access Management (PAM) Lösung an, die die Verwaltung von privilegierten Konten ermöglicht und den Schutz vertraulicher Daten und kritischer Systeme sicherstellt. Endgeräte lokaler Admins können über eine dedizierte PEDM-Lösung (Privilege Elevation Delegation Management)  zusätzlich geschützt werden.


Speaker:

Stefan Rabben brings in 18 years of experience from different leading IT organizations with focus on IT security. Stefan’s vision is the integrated build-in security to manage the Digital Transformation successfully. Before joining WALLIX he was in leading positions at companies like Tech...


There are a lot of creatures from vastly different eras that fit under the heading of "dinosaur", but we lump them all in together for the purpose of understanding their place and their ecosystem.  We can learn a lot from this in defining identity. We'll explore the business value we can learn from dinosaurs, such as:
* The importance of examining dinosaurs (identities) in the same frame of reference
* Securing resources from the stone age and the future all at once
* Why the fossils (aka bones of identity) matter
* How not to go the way of the dinosaurs

Come enjoy a freshly prehistoric take on organizational identity, risk, and governance. 


Speaker:


This talk will focus on why any effective security program must start with identity. Ian Stimpson, walks you through the concept of identity-based security – what it is, what its components are and how your organization can achieve it. See how you can secure the identities of your line-of-business users, as well as your all-powerful privileged users, and how you can safely administer and govern access across your diverse enterprise.


Speaker:

Ian Stimpson is a Solutions Architect who has worked in Cyber Security for over 20 years. His career has been built on designing and delivering business centric solutions to solve the ever-changing business challenges around IT security, enveloping almost all sectors of industry....



Log in to download the presentation:  

Moderators:

Session Links

Quick Links

Stay Connected

Information

Berlin, Germany

Conference

Cybersecurity Leadership Summit 2019

Language:
English
Registration fee:
€1200.00 $1500.00 S$1920.00 13200.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Nov 12 - 14, 2019 Berlin, Germany

Partners

The Cybersecurity Leadership Summit 2019 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00