Striking the balance between enabling users and administrators to be productive whilst protecting your sensitive systems and data is becoming ever more challenging. Attackers are often one step ahead of organisations, and even those with the most comprehensive security systems and controls in place find that an attacker will discover and exploit their Achilles Heel.

This session provides practical steps to enable organisations to successfully implement industry recognized best practices and foundational security controls to secure IT systems and data against the most pervasive attacks. It provides tips to successfully implement a strategy of least privilege, allowing you to eliminate unnecessary privileges and elevate rights across multi platforms and networked devices without hindering end-user productivity, firmly shutting the door on attackers.

John Hathaway

Regional Vice President Middle East and India

Michael Byrnes

Lead Solutions Engineer