The NIST framework for full-cycle privilege orchestration

Logo
Presented by

Dirk Schrader, CISSP, CISM, ISO27001 Practitioner at NNT, Now part of Netwrix

About this talk

A huge percentage of data breaches start with privileged credential abuse. There are often many privileged accounts that today’s overburdened IT security teams lose track of them. Stop leaving privileged accounts available for attackers to compromise and insiders to misuse! Instead, discover and remove them to achieve zero standing privilege (ZSP).   Join the webinar to discover how to: ·   Find accounts with excessive privileges ·   Dramatically reduce your attack surface area with just-in-time (JIT) privilege· ·   Manage and track all privileged activity in one place ·   Implement real-time attack detection and response ·   Adopt additional controls detailed in the NIST cybersecurity framework
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (111)
Subscribers (9341)
Netwrix empowers security professionals to face digital threats with confidence by enabling them to identify and protect sensitive data as well as to detect, respond to, and recover from attacks. More than 13,500 organizations across 100+ countries rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity, and infrastructure. By reducing the cybersecurity burden with Netwrix, organizations concentrate on advancing their cause while reducing cyber risk. For more information, visit www.netwrix.com