
Identity Governance: Manage user profiles and authorization concepts easily
Access management plays a central role for corporate security, but also in compliance standards. We show what PAM and IAG can achieve.
Topic
Governance, Riskmanagement and ComplianceLegislation, standards, regulationsIdentity and access management
When & Where
Details
Format:
Management lecture
Session description
According to a report by the consulting firm Forrester, around 80% of all cyber-attacks that make it into the media these days are based in some way on the theft of privileged credentials. The reason: Privileged access is the easiest and fastest way for cyber criminals to get into an IT system and steal sensitive data.
Privileged users usually have extensive administrator and root rights, which is indispensable for system updates and maintenance tasks, for example. However, these privileges also mean that the holder is typically able to override existing security protocols. This is then precisely the vulnerability that malicious users exploit to make unauthorized system changes, access locked data and/or obfuscate their actions. Traditional secu ...
Privileged users usually have extensive administrator and root rights, which is indispensable for system updates and maintenance tasks, for example. However, these privileges also mean that the holder is typically able to override existing security protocols. This is then precisely the vulnerability that malicious users exploit to make unauthorized system changes, access locked data and/or obfuscate their actions. Traditional secu ...
Speaker
Moderator
