Invitation to Webinar: Control and Track High-Risk Users
What is a "high-risk" user?
A high-risk user:
• Has a high degree of technical knowledge
• Has broad access to the IT infrastructure
• Uses powerful tools to do his/her job
High-risk users include:• IT/ Application Developers • Contractors
• Vendors • Customers
• Partners • Internal IT Operations
Why should customers care about controlling the activities of
high-risk users?
A recent profile of insider attacks showed that a company is most vulnerable from technical users.
“86% of insider attacks were either previously or currently employed fulltime
employees in a technical position within the organization.”
— Insider Threat Study: CERT
This risk is growing due to the increase in IT and application development
outsourcing and the need to secure infrastructure from vendor access.
Learn how to control and track high-risk users to maintain security and compliance while increasing operational efficiency.
This webcast will show you how to:
* Easily control & track high-risk user access;
* Save valuable time, reduce complexity and cut costs;
* Restrict users to authorized areas
* Improve operational efficiency w;
* Ensure compliance with internal and external regulations.
Date: Wed, Jun 17, 2009 2:00 PM - 3:30 PM SGT
Cost:
Free
Click here to register:
https://www2.gotomeeting.com/register/459228714