Protect and Manage Identities
When an organization is subjected to an intrusion, the attacker, in search of better and more useful permissions, will try to move between several computers, increasing the chances of detecting the attacker's activities. We provide examples of measures and what is required for the correct handling of administrative identities to make it more difficult to misuse them. Our experts, Simon Binder and Hasain Alshakarti will also show what these attacks usually look like.
- Learn to identify risks associated with administrative behavior.
- Learn how to think to minimize exposure to administrative privileges.
Have a question you want to be answered during our Tech Talk? Please email it to us at email@example.com.
Who It's For
C-Levels, Security managers, IT managers, IT technicians, IT professionals, and those who work in an IT department and are interested in security issues.