English   Deutsch   Русский   中文    

Информация

Язык:
English
Дата:
04.05. - 07.05.2010
Место:

Forum am Deutschen Museum
Museumsinsel 1
80538 München
Стоимость:
$2772.00
плюс НДС 19%
 
Контактное лицо:

Г-н Levent Kara
+49 211 23707710
[email protected]






Privileged Access Management (PAM) put into Context – Access Governance Strategy or just Tactics?

06.05.2010 10:30-11:30
European Identity Conference 2010
Combined Session
Moderator:

Privileged Access Management (PAM) put into Context – Access Governance Strategy or just Tactics?


Panel: Privileged Identities - Identify, Delegate, Enforce, Audit


High-profile data breaches emphasize the need to maintain and safeguard privileged accounts, but oftentimes, nothing is done to effectively limit exposure of highly sensitive data. There are four key processes that can help organizations regain control of privileged accounts in a cost-effective manner. Identifying, delegating, enforcing and auditing (I.D.E.A.) can improve security and operational efficiency, take control of privileged accounts and close security gaps within the infrastructure.

Specifically, the session will take a closer look at:

  • The steps to identify and document all critical IT assets, their privileged accounts and interdependencies;
  • How to delegate access so that appropriate personnel, using least privilege required, with documented purpose, can login to IT assets in a timely manner at designated times;
  • The process of enforcing rules for password complexity, diversity and change frequency, while minimizing service disruption;
  • Why you should audit and alert that so the requester, purpose, and duration of each privileged access request is documented and management is made aware of unusual events.

 

© 2015 KuppingerCole