Date: Thursday, February 25, 2010
Time: 2:00 p.m. EST/11:00 a.m. PT
Click here to register for free.
Do you have visibility into everything that privileged users are doing on your network? Would you know if an unauthorized user gained access to and misused privileged credentials? The frequency of these threats is increasing and compliance regulations are changing to mandate monitoring of privileged user access. Yet most organizations can't answer "yes" to these questions.
This webcast will present the challenges related to privileged user monitoring and highly efficient ways to overcome them. Through real end-users sharing their stories and an expert panel discussion, you'll gain insight into how to detect and thwart rogue behavior. You'll also learn how to gain rapid and complete visibility into the creation and modification of users and accounts, automatically identifying suspicious behavior, such as accounts created with non-expiring passwords or non-standard naming conventions. You'll discover how an integrated log management and SIEM 2.0 solution can provide you with unparalleled visibility to privileged user activity and automate compliance.
This panel discussion will focus on both the practical and regulatory aspects of effective privileged user monitoring - featuring two IT executives and a compliance expert.
Learn how to discover and prevent:
- Unauthorized or malicious access to confidential assets
- Inadvertent exposure of confidential systems/assets to unauthorized users
- Movement of confidential data to unauthorized individuals or destinations
- Inappropriate or unauthorized changes to user/account profiles and privileges
- And more...
Nick Levay, manager of information security and operations, Center for American Progress (CAP)
Michael Chapman, director, digital security and technical operations, Ascent Media Group
Eric Knight, senior knowledge engineer, LogRhythm