Myth Busters has become a TV phenomenon with great antics to prove or disprove commonly head "truths" as "urban legend, wife's tale or grounded in fact-based truth. In today's enterprise a common myth is that no one ever actually misuses the information technology (IT) privileges granted them. We thought we take a closer poke at this and bust it wide open.
What we have to understand:
- What are those IT privileges?
- How would they be misused?
- Why would they be misused?
- How would I know if they are in fact being misused at all?
IT privileges are the electronic authorizations granted a user or resource to accomplish tasks on their PC, laptop, server or network device (physical, virtual or cloud-based).
Scott Lang, Sr. Director, Product Marketing at BeyondTrust
Scott Lang has nearly 20 years of experience in technology product marketing, currently guiding the product marketing strategy for BeyondTrust’s privileged account management solutions and vulnerability management solutions. Prior to joining BeyondTrust, Scott was director of security solution marketing at Dell, formerly Quest Software, where he was responsible for global security campaigns, product marketing for identity and access management and Windows server management.