Protect and manage identities
When an organization is subjected to an intrusion, the attacker in search of better and more useful permissions will try to move between several computers. increased chances of detecting the attacker's activities. We provide examples of measures and what is required for the correct handling of administrative identities in order to make it more difficult to misuse them. Our experts Simon Binder and Hasain Alshakarti will also show what these attacks usually look like.
- Learn to identify risks associated with administrative behavior
- Learn how to think to minimize exposure to administrative privileges
Have a question you want to be answered during our Tech Talk? Mail it to us at firstname.lastname@example.org
C-level, Security managers, IT managers, IT technicians, IT professionals, and for those who work in an IT department and who are interested in security issues.