The Who's Who of IT Admins and How to Secure Them

Logo
Presented by

Hamza Tariq & Adam Markert

About this talk

Watch to learn about different types of high-risk and administrative accounts, and the best practices to secure these human and non-human identities. Protecting access to critical systems and extending these controls to secure an evolving landscape is critical. We will discuss foundational principles, best practices for securing access to accounts with persistent access, how zero-standing privileges (ZSP) and just-in-time (JIT) reduces risk of credential theft past the principle of least privilege, and how to secure identities that are becoming frequent targets of attackers.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (74)
Subscribers (10305)
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.