Sponsored Lunch: Your Biggest Vulnerability – The Privileged User
Project and Program:
SHARE-wide Events,
Tags:
Proceedings ,
SHARE Atlanta 2016 ,
2016
Privileged users are both a blessing and a curse. On the one hand, they help keep our systems, applications and data available and secure. On the other, they are the front door for all kinds of security breaches, so in reality, they are your biggest vulnerability if you don't take the necessary precautions! In this session, we look at some of these security breaches, the root cause and logical steps you can take to protecting your organisation. Learn about security capabilities to enforce segregation of duties, provide strong authentication, detect toxic entitlements, audit privileged users, and monitor compliance using IBM Security zSecure, IBM Resource Access Control Facility (RACF), IBM Security Identity Governance and Intelligence, IBM Security QRadar SIEM, IBM Multi-Factor Authentication for z/OS and other security solutions.-Jamie Pease-IBM United Kingdom
Back to Proceedings File Library