Martin Cannard, Vice President of Product Strategy at Netwrix.
About this talk
The last two decades have seen massive change in the IT landscape: We’ve seen workloads shift from the datacenter to the cloud, applications move from the desktop to mobile devices, and an increase in the frequency and sophistication of attacks to the point where it's not if you’ll get breached but when. Yet, the process we use for locking down access to our most sensitive systems — privileged access management (PAM) — has not fundamentally changed.
Is there a better way to approach PAM? Join this session to learn how you can:
• Leverage just in time orchestration to remove attack surfaces
• Dynamically delegate just-enough access according to use case.
• Enable administrators to do their jobs without jumping through hoops.
• Limit the spread of malware.
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.…