Privileged user monitoring: Automating compliance & managing risk

Choosing the right security information management solution
Choosing the right security information management solution


Date: Thursday, February 25, 2010
Time: 2:00 p.m. EST/11:00 a.m. PT

Click here to register for free.

Do you have visibility into everything that privileged users are doing on your network? Would you know if an unauthorized user gained access to and misused privileged credentials? The frequency of these threats is increasing and compliance regulations are changing to mandate monitoring of privileged user access. Yet most organizations can't answer "yes" to these questions.

This webcast will present the challenges related to privileged user monitoring and highly efficient ways to overcome them. Through real end-users sharing their stories and an expert panel discussion, you'll gain insight into how to detect and thwart rogue behavior. You'll also learn how to gain rapid and complete visibility into the creation and modification of users and accounts, automatically identifying suspicious behavior, such as accounts created with non-expiring passwords or non-standard naming conventions. You'll discover how an integrated log management and SIEM 2.0 solution can provide you with unparalleled visibility to privileged user activity and automate compliance.

This panel discussion will focus on both the practical and regulatory aspects of effective privileged user monitoring - featuring two IT executives and a compliance expert.

Learn how to discover and prevent:

  • Unauthorized or malicious access to confidential assets
  • Inadvertent exposure of confidential systems/assets to unauthorized users
  • Movement of confidential data to unauthorized individuals or destinations
  • Inappropriate or unauthorized changes to user/account profiles and privileges
  • And more...

Featured speakers
Nick Levay, manager of information security and operations, Center for American Progress (CAP)
Michael Chapman, director, digital security and technical operations, Ascent Media Group
Eric Knight, senior knowledge engineer, LogRhythm

Sponsored by

 

Sign up to our newsletters

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...