The NIST framework for full-cycle privilege orchestration

Logo
Presented by

Dirk Schrader, CISSP, CISM, ISO27001 Practitioner at NNT, Now part of Netwrix

About this talk

A huge percentage of data breaches start with privileged credential abuse. There are often many privileged accounts that today’s overburdened IT security teams lose track of them. Stop leaving privileged accounts available for attackers to compromise and insiders to misuse! Instead, discover and remove them to achieve zero standing privilege (ZSP).   Join the webinar to discover how to: ·   Find accounts with excessive privileges ·   Dramatically reduce your attack surface area with just-in-time (JIT) privilege· ·   Manage and track all privileged activity in one place ·   Implement real-time attack detection and response ·   Adopt additional controls detailed in the NIST cybersecurity framework

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (161)
Subscribers (5235)
Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach. Our solutions also limit the impact of attacks by helping IT teams detect, respond and recover from them faster and with less effort. Over 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.