Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo Knowledge Forum E

Least Privilege - Why users should only have enough access to complete a task

This speaker session will explain how a PAM solution and least privilege can help mitigate serious cyber threats.

calendar_today Thu, 27.10.2022, 12:45 - 13:00

event_available On site

Action Video


Action description







Secure Homeoffice Cloud Security Identity and access management Endpoint Protection



This action is part of the event Forums it-sa Expo

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description


Many cyber attacks are based on the misuse of administrator rights and stolen passwords. This is where a solid defence strategy should start, because damage to the company can be averted through effective control of rights and access data by means of Privileged Access Management (PAM).

Who hasn't experienced this: many users within the organisation want as many rights as possible so they don't have to call support every time they need them. On the other hand, the IT department doesn't want to be contacted for every little issue - so it's tempting to give users more rights than they actually need. This creates a considerable risk - lose of control, because employees are able to make unlimited installations and changes, possibly affecting the stability or performance of the system.

Much more dangerous, however, is that an attacker can compromise an account with privileged access rights and cause considerable damage.

Who has which rights in the company, for how long and why? Where in the company are privileged accounts located and how are they used? Who has access to these accounts and thus access to critical target systems? Is access data regularly exchanged in accordance with a strong password policy? Questions like these should definitely be answered in order to minimise the risk of misuse and thus a possible attack. A PAM solution can help.

This presentation will explain how a Privileged Access Management (PAM) solution including least privilege can help to contain serious cyber threats and at the same time create a solid security foundation for a successful digital transformation.

... read more

Language: German

Questions and Answers: No


show more
Remember Remove

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.