
Least Privilege - Why users should only have enough access to complete a task
This speaker session will explain how a PAM solution and least privilege can help mitigate serious cyber threats.
Topic
When & Where
Thu, 10/27/2022, 12:45 - 13:00
Details
Format:
Management lecture
Session description
Many cyber attacks are based on the misuse of administrator rights and stolen passwords. This is where a solid defence strategy should start, because damage to the company can be averted through effective control of rights and access data by means of Privileged Access Management (PAM).
Who hasn't experienced this: many users within the organisation want as many rights as possible so they don't have to call support every time they need them. On the other hand, the IT department doesn't want to be contacted for every little issue - so it's tempting to give users more rights than they actually need. This creates a considerable risk - lose of control, because employees are able to make unlimite ...
Moderator
