Many Universities have diverse and robust user populations. Just think of all the attributes, roles and access needed for undergrad and graduate students, facility, teachers, university hospitals or healthcare systems, and more. This complex network of users, admins, and accounts requires a complete Privileged Access Management (PAM) solution that protects and manages the many different types of privileged accounts within the Higher Ed system.
That’s why one major University turned to BeyondTrust to implement a Just-in-Time Privileged Access Management (JIT PAM) model to enforce true “least privilege.” JIT PAM is a model that ensures users, processes, applications, systems, etc. have “just enough” privileged access when needed, and for the least amount of time necessary.
Join Chris Stucker, Associate Director for Identity and Access Management, University of Utah, as he shares his experience around a JIT PAM implementation and Universal Privilege Management (UPM) approach to security. Chris will discuss how JIT PAM:
- Dramatically improves productivity across the university security and IT teams
- Helps to mitigate internal & external threats
- Provides administrators the visibility to look back and audit what people did
- Enables remote employees and students to stay productive & secure during the pandemic and beyond
- Is helping to shape a strategic plan for the University’s cybersecurity future
BeyondTrust’s CTO and CISO Morey Haber will also cover how BeyondTrust’s Universal PAM approach aligns with NIST-CSF to help universities mitigate insider threats (NIST-CSF Protect), achieve compliance, and receive federal funding and competitive grants.
You won’t want to miss out on this discussion!
CPE Credit Qualification: Many of our webinars qualify as CPE credit. Please provide your
(ISC)2 ID certificate number when you register for the webinar and your CPEs will automatically be added to
your (ISC)2 account within 4-6 weeks.