Description: Despite the increased understanding in the importance of locking down privileged account access, the fact is that privileged access is not limited to users with a "heartbeat." Enterprise applications, including COTS and custom-built apps often require the same access to privileged accounts as privileged users do. Understanding how breaches occur has allowed for the creation of a methodology, which focuses on reducing the most risk for the least effort first. A phased approach ensures the ability to show measurable risk reduction, and meet compliance, without impacting operational efficiency.
For More Information Please Visit:- http://www.grrcon.com/
http://www.irongeek.com/i.php?page=videos/grrcon2017/mainlist
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.