About | Speakers | Exhibitors | Reviews | Photos |
There are privileged accounts – accounts with elevated access rights – for just about every walk of life in the modern enterprise. In the IT .. Read more world, we have sysadmin access to the cloud, the network and all the devices an applications that run on it. We have helpdesks staff that can reset passwords and access credentials. Outside of IT we have privileged users who can authorise payments, change your web and social pages, access sensitive IP, or sensitive personal data. Some account holders work for your suppliers or customers rather than you. Some aren’t human: they are apps accessing data in your systems – and some are both non-human, and belong to external organisations. In this computing web seminar we will unveil exclusive research into just how insecure practises in modern enterprises are, and discuss how you can get a grip with privileged access management by adopting a zero trust strategy.
- Share your Experience
- Organizer