Abuja & Lagos Chapter – February 2021

0Days0Hours0Minutes0Seconds

Chapter Overview

Date: Wednesday, 24th of February 2021

Time: 12.00 pm – 1.30 pm (WAT)

Platform: Digital Alliances

Location: Digital Alliances – Microsoft Teams Link – Invite Only

Overall Theme: 10 steps to Universal Privilege Management

Why relying on password management alone leaves dangerous gaps in protection

Disrupting the cyberattack chain with privileged access security controls

Essential steps to achieving rapid leaps in risk reduction

Keys to a frictionless PAM solution that is invisible to end users

Supportive Links

https://www.beyondtrust.com/resources/videos/universal-privilege-management-journey

https://www.beyondtrust.com/resources/whitepapers/universal-privilege-management

https://www.beyondtrust.com/blog/entry/passwordless-administration-explained

  • 1145

    Welcome Remarks & Joining Time

  • 1210

    Focused Session

    Session Leader: Michael Byrnes – Director, Solutions Engineering iMEA – BeyondTrust

    Session Title: 10 steps to Universal Privilege Management

    Session Synopsis:

    Virtually every cybersecurity breach today involves the exploitation of privileged access. Privileges are initially exploited to infiltrate an IT environment; once compromised by threat actors, privileges are further leveraged to move laterally, access assets, install malware, and inflict damage.

    In this session, learn 10 key steps to achieving Universal Privilege Management, and how it is used to secure every user, session, and asset across your IT environment. Covered topics include:

    • Why relying on password management alone leaves dangerous gaps in protection 
    • Disrupting the cyberattack chain with privileged access security controls 
    • Essential steps to achieving rapid leaps in risk reduction 
    • Keys to a frictionless PAM solution that is invisible to end users 

    We will also share how the BeyondTrust Privileged Access Management (PAM) platform enables absolute control over every privilege in your environment to drastically reduce your attack surface and windows of exposure, while boosting business productivity.

  • 1250

    Debate & Questions

  • 1325

    Action Areas and Next Steps

Selected Value: 0