Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of WALLIX GmbH
Forums it-sa Expo Knowledge Forum B

Access Management as the foundation for a comprehensive security strategy

Access management plays a central role for corporate security, but also in compliance standards. We show what PAM can achieve.

calendar_today Tue, 10.10.2023, 11:15 - 11:30

event_available Hybrid

place Forum, Booth 6-235

Action Video

south_east

Action description

south_east

Themes

Governance, Riskmanagement and Compliance Identity and access management

Key Facts

  • Loss of privileged accounts is security risk no. 1
  • Access management is crucial for corporate security
  • Compliance standards demand comprehensive access control

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

According to a report by the consulting firm Forrester, around 80% of all cyber-attacks that make it into the media these days are based in some way on the theft of privileged credentials. The reason: Privileged access is the easiest and fastest way for cyber criminals to get into an IT system and steal sensitive data.

Privileged users usually have extensive administrator and root rights, which is indispensable for system updates and maintenance tasks, for example. However, these privileges also mean that the holder is typically able to override existing security protocols. This is then precisely the vulnerability that malicious users exploit to make unauthorized system changes, access locked data and/or obfuscate their actions. Traditional security solutions offer no protection here.

In our presentation, learn...
- why access management is so important for security,
- what the scope of "Access Management" technologies entails,
- in which compliance standards access control plays a central role and
- how a PAM system is typically structured.

The International Forum is also available as a livestream. Follow this link to access the broadcast.

... read more

Language: English

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.