Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo Knowledge Forum E

Least Privilege - Why users should only have enough access to complete a task

This speaker session will explain how a PAM solution and least privilege can help mitigate serious cyber threats.

calendar_today Thu, 27.10.2022, 12:45 - 13:00

event_available On site

Action Video

south_east

Action description

south_east

Speaker

south_east

Product

south_east

Themes

Secure Homeoffice Cloud Security Identity and access management Endpoint Protection

Organizer

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

 

Many cyber attacks are based on the misuse of administrator rights and stolen passwords. This is where a solid defence strategy should start, because damage to the company can be averted through effective control of rights and access data by means of Privileged Access Management (PAM).

Who hasn't experienced this: many users within the organisation want as many rights as possible so they don't have to call support every time they need them. On the other hand, the IT department doesn't want to be contacted for every little issue - so it's tempting to give users more rights than they actually need. This creates a considerable risk - lose of control, because employees are able to make unlimited installations and changes, possibly affecting the stability or performance of the system.

Much more dangerous, however, is that an attacker can compromise an account with privileged access rights and cause considerable damage.

Who has which rights in the company, for how long and why? Where in the company are privileged accounts located and how are they used? Who has access to these accounts and thus access to critical target systems? Is access data regularly exchanged in accordance with a strong password policy? Questions like these should definitely be answered in order to minimise the risk of misuse and thus a possible attack. A PAM solution can help.

This presentation will explain how a Privileged Access Management (PAM) solution including least privilege can help to contain serious cyber threats and at the same time create a solid security foundation for a successful digital transformation.

... read more

Downloads

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.