Privileged access exists in many forms such as Local Administrative Accounts, Domain Administrative Accounts, Service Accounts, Application Credentials and SSH Keys. Privileged accounts, credentials and secrets are found in devices, applications and operating systems.
Experts agree it’s a best practice to ensure they are protected, managed and monitored. Whether your organisation choices an on premises of SaaS for Privileged Access Management (PAM) solution, your program should start with steps that focus on rapid risk reduction for high value assets.
In this session, we’ll review what is considered to be table stakes Privileged Access Management hygiene, and we’ll focus on three key areas for a Privileged Access Management security program:
•Account Discovery and Credential Vaulting
•Session Management and Isolation
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs…