Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

lecture-header-beyondtrust-desktop
Launch Days Technology II

Effective security: Least Privilege as an important pillar of your PAM strategy

This BeyondTrust presentation explains practical information around Endpoint Privilege Management.

calendar_today Wed, 07.10.2020, 13:15 - 13:30

event_available Digital

Action description

south_east

Speaker

south_east

Product

south_east

Themes

Awareness / Phishing / Fraud Endpoint Protection Identity and access management

Organizer

Event

This action is part of the event Launch Days

Action description

It is becoming more and more difficult to find a good balance of distribution of rights for employees and administrators. Users as well as IT administrators should be given sufficient authorizations to carry out their work productively, while at the same time minimizing the IT security risk and protecting sensitive data and systems. Attackers are often one step ahead of organizations. Even those with the most comprehensive IT security systems and control mechanisms fear that an attacker could discover and exploit a vulnerability. This talk explains practical tools that companies can use to implement industry-recognized best practices for endpoint privilege management and basic security controls to protect IT systems and data from the most common attacks. It contains tips for successfully implementing a Least Privilege Strategy that will help you get rid of unnecessary permissions. Likewise, rights can be increased on multiple platforms and networked devices without affecting end-user productivity. ... read more

Language: German

Questions and Answers: Yes

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.