Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of BeyondTrust
Forums it-sa Expo 2023 Knowledge Forum E

Least Privilege - Effective reduction of the attack surface

This speaker session will explain how a PAM solution and least privilege can help mitigate serious cyber threats.

calendar_today Wed, 11.10.2023, 16:30 - 16:45

event_available On site

place Hall 7A, Booth 7A-102

Action Video


Action description





Cloud Security Endpoint Protection Identity and access management Secure Homeoffice Websecurity / VPN



This action is part of the event Forums it-sa Expo 2023

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Many cyber attacks are based on the misuse of administrator rights and stolen passwords. This is where a solid defence strategy should start, because damage to the company can be averted through effective control of rights and access data by means of Privileged Access Management (PAM).

Who hasn't experienced this: many users within the organisation want as many rights as possible so they don't have to call support every time they need them. On the other hand, the IT department doesn't want to be contacted for every little issue - so it's tempting to give users more rights than they actually need. This creates a considerable risk - lose of control, because employees are able to make unlimited installations and changes, possibly affecting the stability or performance of the system.

Much more dangerous, however, is that an attacker can compromise an account with privileged access rights and cause considerable damage.

Who has which rights in the company, for how long and why? Where in the company are privileged accounts located and how are they used? Who has access to these accounts and thus access to critical target systems? Is access data regularly exchanged in accordance with a strong password policy? Questions like these should definitely be answered in order to minimise the risk of misuse and thus a possible attack. A PAM solution can help.

This presentation will explain how a Privileged Access Management (PAM) solution including least privilege can help to contain serious cyber threats and at the same time create a solid security foundation for a successful digital transformation.
... read more

Language: German

Questions and Answers: No


show more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.