Building a Privileged Access Management Strategy for the Post-COVID World

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Improvements in cybersecurity technologies have made it more difficult for threat actors to mount direct attacks on organizations’ networks. Cyber-criminals are therefore increasingly looking for alternative routes into systems to steal sensitive and confidential data. One of these involves compromising the login credentials of employees or external contractors/vendors, especially those who have privileged accounts and are able to freely access sensitive systems and data.

This issue has been exacerbated by the COVID-19 pandemic, with remote employees more vulnerable to having their login credentials compromised. A zero-trust model of security has regularly been highlighted as vital to keeping a hybrid workforce secure alongside internal employees and external contractors, and this must be underpinned by a strong privileged access management policy, ensuring that compromised accounts do not lead to disastrous data breaches for businesses. This webinar will explore the latest trends and challenges in privileged access management, and outline the strategies and technologies required to stay one step ahead of threat actors.

In this webinar, a panel of experts will discuss:

  • How threat actors are increasingly targeting staff or contractor accounts to steal sensitive data
  • The importance of privileged access management in keeping organizations secure, particularly for a hybrid workforce
  • The steps required to develop a successful privileged access management policy

>> Log in or complete this short form to register >> 


Photo of Brennan Baybeck

Brennan Baybeck

ISACA Board Director; VP & CISO for Customer Services, Oracle

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Thomas O'Brien

Thomas O'Brien

Product Manager, Apitech

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.