
Zero Standing Privilege or Ephemeral Privileges: A better approach to PAM
Learn, how to discover standing privileged accounts and replace them with temporary, on-demand access.
Topic
Data security / DLP / Know-how protectionEndpoint ProtectionIdentity and access management
When & Where
Details
Format:
Technology lecture
Session description
A whopping 74% of data breaches start with privileged credential abuse. Stop leaving privileges available for attackers to compromise and insiders to misuse. Instead, discover standing privileged accounts and replace them with temporary, on-demand access. Learn from our expert Dirk Schrader, Field CISO EMEA & APJ, VP of Security Research at Netwrix, CISSP, CISM, how to secure privileged access in your organization.