Out of sight, out of mind? - Securing privileged account access in the data centre

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Whether you’re operating a private cloud or accessing services such as email and back-up/restore services from a public Internet-accessible resource, ultimately your data is only as safe as the trusted employees in the data centre.

Do you really know what these systems administrators are doing when they access servers and systems containing your corporate data?

How do you ensure that company policies followed by your own staff and systems administrators are equally rigorous on a remote resource?

Compliance with regulations such as the Data Protection Act and guidelines such as the Financial Service Authority, ISO 27001 and PCI DSS 2.0, will be impacted if your third party suppliers are unable to manage the activity of their own privileged account users.

This 60 minute webinar will address the issue of controlling and auditing privileged user access and cover the crucial questions to ask your provider before entrusting them with your data.

This webinar will:

  • Help you understand the security problems that stem from shared access accounts
  • Educate you on the best practices on privileged account access
  • Explain the technology available to help make your account accesses more compliant
  • Assist you in developing a road map for better account security

This webinar is for:

  • IT managers concerned about the use of super-user privileges on their systems
  • IT security professionals looking to adopt best practices in this important aspect of security
  • Managers wanting to update themselves on the regulatory issues involved with privileged account access
  • Anyone wanting to bring themselves up to speed on privileged user activity management.
     

 CISSP SSCP logo
CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

Speakers

Steve Gold

Infosecurity Magazine

Photo of Bob Tarzey

Bob Tarzey

Analyst and Director, Quocirca

Photo of Richard Walters

Richard Walters

CTO of CensorNet

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.