+1-202-802-9399 (US)
Icon - policies are searched to determine if there is a match to the application

One Size Doesn’t Fit All: Defining Least Privilege Policies for Different Departments & Users

Thursday, April 25, 2019 | 11:00 AM ET | 1 CPE Credit

With 85% of breaches involving compromised endpoints, organizations are implementing a least privilege security posture and application control to minimize risks caused by cyberattacks and fraudulent users. Before getting started, you’ll need to design policies for different departments and users, keeping in mind how implementing least privilege will affect their productivity. Your IT Admins, for example, should have standard accounts without privileged network access for day-to-day tasks and be granted privileged access only occasionally as needed. Your business users will need access to applications with restricted privileges that do not interfere with getting their work done.

Join Thycotic’s Privilege Manager Product Manager, Steve Goldberg, and Product Marketing Manager, Barbara Hoffman, as they show you how to create a custom least privilege security plan that manages different users and application requirements based on different department needs. They will share real-world examples of policies that help organizations implement a least privilege strategy.

You’ll learn: 

  • How to automate your application policies and workflows to review and approve applications to accommodate different departments
  • How to craft your department policies to meet your team’s access needs while meeting your IT policy and compliance requirements
  • Why the cloud makes so much sense for endpoint management

Each webinar registrant will also get their own copy of the “Least Privilege Cybersecurity for Dummies” eBook to kick start their least privilege program.

SHARE THIS


The following two tabs change content below.
mm

Barbara Hoffman

Barbara is a newer addition to the Thycotic. She comes with nearly a decade of experience in IT software and security, and many more years working in product management, development and marketing across a number of different industries.
mm

Latest posts by Barbara Hoffman (see all)

mm

Barbara Hoffman
Barbara is a newer addition to the Thycotic. She comes with nearly a decade of experience in IT software and security, and many more years working in product management, development and marketing across a number of different industries.

mm

Steve Goldberg
Steve Goldberg began his career as a consultant and developer but has more recently served as a senior technical resource for solution engineering and product management teams. At Thycotic, Steve works as Senior Product Manager for the Privilege Manager solution. When not working, he’s playing tennis, watching the LA Kings, seeing as much live music as possible, and pretending like he knows a lot about wine.

ISC-CPE Credit LogoInterested in CPE Credit for attending? Please provide your (ISC)2 ID certificate number when you register. You will then automatically see your CPE credit added to your (ISC)2 account within 4-6 weeks. Note, most Thycotic webinars qualify for 1 CPE credit.

Watch the Webinar