Restructure Access to Implement and Maintain a Least Privilege Access Model
Part 2 of this webinar series took you through the first 3 phases of Data Access Governance (DAG) which set the foundation for establishing a least privilege access model. In this final webinar of the series, we’ll introduce the action phases of DAG: Restructure and Govern.
In Part 2, we discussed how to pinpoint where all your data resides, determine the most relevant data points to collect about your data, and monitor all the activity around that data so you can identify and assign data custodians to help you manage access. In Part 3, you’re now ready to put that data to good use and effect positive change to your organization’s security stature.
Join Adam Laub, SVP of Product Marketing at STEALTHbits Technologies, once again as he walks you through the Restructure and Govern phases of Data Access Governance. He'll guide you through how to best position your data custodians to manage and control access to their data by performing regular entitlement reviews and facilitating self-service access requests.
Participants will learn:
- Why Resource-based Groups are the best way to ensure only the right people have the right level of access to your data resources
- How automated Entitlement Reviews and Self-Service Access Requests can increase security, fulfill compliance requirements, and drastically ease the operational burden on your IT administrators
This webinar series qualifies for CPE credit. If you are unable to join the live webinar, register to receive a video recording after the event.
Date: Wednesday, October 3
Time: 11:00 AM EDT
Duration: 60 minutes
SVP of Product Marketing
STEALTHbits Technologies, Inc.