Best Practice B-11: SECURING ACCESS WITH Privileged Access Management: REDUCE RISKS FROM OVER-PRIVILEGED USERS

Best Practice B-11: SECURING ACCESS WITH Privileged Access Management: REDUCE RISKS FROM OVER-PRIVILEGED USERS

Wednesday, March 10, 2021 2:40 PM to 3:02 PM · 22 min. (Africa/Abidjan)
Best Practice Purple Stage
Best Practice Purple Stage April 6

Information

With so many high-profile breaches accomplished through compromising passwords on privileged accounts, PAM is a top priority for organizations of all sizes (Gartner puts it at the top of the security list for two years running). Join Thycotic’s Chief Security Scientist Joseph Carson, as he takes you on a brief journey through the PAM lifecycle to get you quickly up to speed and understand the PAM matrix of all the different types of privileged accounts that exist across all your different IT domains, often referred to as your privileged account attack surface.

Log in