Stay Safe: Managing Employee Access from Cradle to Grave

Logo
Presented by

Phyllis Drucker, Influencer | EZ2BGR8 Service Management |

About this talk

In a world where the vast majority of cyber attacks leverage access-based methods to gain entry to an organization's resources, how can you be sure your organization remains secure? This session explores best practices for ensuring all employees have the access they need, while ensuring that access is revoked promptly when they no longer need it. It starts with the reality that most enterprises have grown to large to rely on manual efforts, needing a combination of identity access management tools, implemented appropriately, and includes: - The importance of creating a role-based access provisioning program that follows employees through their entire organizational lifecycle, from onboarding, through job changes, transfers and eventually, separation from the organization - Automating and integrating the need for privileged access with the organization's change management process Be prepared for a primer in how to get started on this journey and make it successful over the long term.
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (620)
Subscribers (205512)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.