Building a Privileged Access Management Strategy for the Post-COVID World

Logo
Presented by

James Coker

About this talk

Improvements in cybersecurity technologies have made it more difficult for threat actors to mount direct attacks on organizations’ networks. Cyber-criminals are therefore increasingly looking for alternative routes into systems to steal sensitive and confidential data. One of these involves compromising the login credentials of employees or external contractors/vendors, especially those who have privileged accounts and are able to freely access sensitive systems and data. This issue has been exacerbated by the COVID-19 pandemic, with remote employees more vulnerable to having their login credentials compromised. A zero-trust model of security has regularly been highlighted as vital to keeping a hybrid workforce secure alongside internal employees and external contractors, and this must be underpinned by a strong privileged access management policy, ensuring that compromised accounts do not lead to disastrous data breaches for businesses. This webinar will explore the latest trends and challenges in privileged access management, and outline the strategies and technologies required to stay one step ahead of threat actors. In this webinar, a panel of experts will discuss: · How threat actors are increasingly targeting staff or contractor accounts to steal sensitive data · The importance of privileged access management in keeping organizations secure, particularly for a hybrid workforce · The steps required to develop a successful privileged access management policy
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (598)
Subscribers (44304)
Dedicated to serving the information security community, in person, in print and online.