Implementing Zero Standing Privilege and Just in Time Access

Logo
Presented by

Josh Kirkwood and Brandon Traffanstedt

About this talk

IT admins and developers are two highly targeted identities for attackers. So what's the best way to tackle their unique access needs without adding hurdles to their day-to-day workflows? Enforce just-in-time access principles and least privilege whenever possible. Join us for a deep dive into the practical applications of just-in-time access and newer themes like zero standing privileges. We’ll explore how these concepts can be combined to bring both operational and security focused benefits with the goal of minimizing standing entitlements while maximizing visibility and user experience across data center and Cloud environments. In this webinar, you will learn how to bring your security program from foundational to exceptional through best practices for both securing IT admins and developers, as well as discover: How to deliver measurable cyber risk reduction while maintaining operational efficiency across these sensitive personas How to reduce compliance gaps across environments How to overcome identity explosion
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (74)
Subscribers (10305)
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.