SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
World®
’16
Tech	Talk:	Governing	Your	Privileged	Users	– A	
Key	Step	Towards	Reducing	the	Risk	of	Breach
Ehud	Amiri – Product	Management	– CA	Technologies
SCT38T	
SECURITY
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
Many	organizations	have	a	solution	to	control	the	actions	of	privileged	users.	But,	that’s	not	
enough	for	a	complete	privileged	user	management	solution	– you	must	also	govern	their	access	
to	make	sure	that	only	the	correct	users	have	elevated	privileges,	and	they	have	only	the	
privileges	that	they	need.	This	Tech	Talk	is	an	overview	of	the	Pre-Con	Ed	in-depth	session	on	
Privileged	User	Governance.	Come	here	to	learn	how	you	can	reduce	your	risk	through	this	
capability	that	is	unique	to	CA.
Ehud
Amiri
CA	Technologies
Product	Management
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
One	Stop	Shop	for	all	Identity	Services	
Everything	the	Business	User	Needs	in	One	Place
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Why	Privileged	Access	Governance	is	Needed?
§ The	Situation	Today
– Privileged	Access	Management	(PAM)	is	mostly	a	standalone solution	that	implements	critical	
security	and	compliance	controls	managing	and	monitoring	use	of	sensitive	access
– In	most	cases	it	is	separated from	the	corporate	Identity	Management	
§ The	outcome
– Lack	of	overall	visibility	to	“who	has	access	to	what”
– Missing	approval	and	auditing	information	for	“why	access	was	granted”
– Inability	to	enforce	consistent	identity	policies	such	as	Segregation	Of	Duties
– Lack	of	risk	analysis	for	the	overall	user	access
– Fragmented	compliance	with	regulatory	requirements	such	as	ISO27002	sections	8.1.2	“ownership	of	
assets”	and	9.2.5	“review	of	access	rights”
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Privileged	Access	Governance
§ The	CA	Approach
– Providing	governance	for	Privileged	Access	is	critical
– Governance	should	be	consistent	across	privileged	
access	and	non-privileged	access
– As	always,	it’s	all	about	the	user	experience!
§ The	CA	Identity	Suite	Solution
– Automated	provisioning	and	de-provisioning
– Access	request
– Access	certification
CA	Identity	Suite	Integration	with	CA	Privileged	Access	Manager
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Automated	Provisioning	and	De-Provisioning
§ Automate	on-boarding	and	off-boarding	of	PAM	
Accounts	as	part	of	regular	user	lifecycle
§ Out	of	the	box	CA	Identity	Suite	connector	for	
CA	PAM	using	standard	PAM	APIs
§ Manage	PAM	Accounts	and	their	assignments	to	
Roles,	User	Groups,	Devices	&	Device	Groups
§ Support	for	local	accounts	and	LDAP/AD	
accounts
§ Support	for	granular	access	assignments	
including	start/end	date,	role	scoping	and	device	
policies	
Integration	with	CA	Privileged	Access	Manager
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Access	Certification
§ Gain	visibility	into	all	user	access	in	a	centralized	
place
§ Granular	insight	into	CA	PAM	accounts,	roles,	
groups	&	devices
§ Out	of	the	box	CA	PAM	certification	processes:
– PAM	user	certification
– PAM	device	certification
§ Easily	identify	users	with	excessive	access
§ Fulfillment	using	the	connector	for	CA	PAM
Integration	with	CA	Privileged	Access	Manager
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Access	Request
§ Easy-to-use	access	request	for	CA	PAM	
permissions	through	an	intuitive	'Shopping	Cart‘	
experience
§ Real-time	risk	analysis	of	a	combined	privileged	
and	non-privileged	access
§ All	requests	can	be	checked	for	segregation	of	
duties	compliance
§ Business	description,	workflow,	localization,	
recommendations,	etc.
§ Fulfillment	using	the	connector	for	CA	PAM
Integration	with	CA	Privileged	Access	Manager
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Why	Now	and	Why	CA	for	Privileged	Access	Governance?
§ Compliance
– Many	organizations	are	facing	compliance	pressure	to	ensure	proper	privileged	access	governance	is	
implemented
§ Better	Security
– Managing	and	governing	“who	has	access	and	why”	for	privileged	access	is	becoming	more	important	
in	the	broader	fight	against	security	breaches
§ Eliminating	Silos	
– Implementing	separate	governance	solutions	for	privileged	access	and	non-privileged	access	may	
create	unintended	weaknesses	in	customers’	cyber-security	strategy
§ One	Stop	Shop
– By	integrating	CA	Identity	Suite	and	CA	Privileged	Access	Management,	customers	can	easily	
implement	an	enterprise-wide	approach	that	is	based	on	two	proven	&	market	leading	solutions
Making	the	Right	Choice
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
SCT39T	 PAM	for	Hybrid	Enterprises 11/17/2016	at	1:45	pm
SCT37T Streamlining	IDM	Deployment 11/17/2016	at	3:00	pm
SCT05T PAM	Behavioral	Analytics 11/18/2016	at	4:30	pm
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
We	Want	to	Hear	From	You!
§ IT	Central	is	a	leading	technology	review	site.		CA	has	them	to	
help	generate	product	reviews	for	our	Security	products.
§ ITCS	staff	may	be	at	this	session	now!	(look	for	their	shirts).	If	
you	would	like	to		offer	a	product	review,	please	ask	them	
after	the	class,	or	go	by	their	booth.
Note:
§ Only	takes	5-7	mins
§ You	have	total	control	over	the	review
§ It	can	be	anonymous,	if	required
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Security
For	more	information	on	Security,	please	visit:	
http://cainc.to/EtfYyw

Contenu connexe

Tendances

Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...CA Technologies
 
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadTech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadCA Technologies
 
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...CA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesCA Technologies
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldCA Technologies
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a ServiceCA Technologies
 
Pre-Con Ed: Five Easy Steps for Migrating to CA Directory
Pre-Con Ed: Five Easy Steps for Migrating to CA DirectoryPre-Con Ed: Five Easy Steps for Migrating to CA Directory
Pre-Con Ed: Five Easy Steps for Migrating to CA DirectoryCA Technologies
 
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...CA Technologies
 
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementPre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementCA Technologies
 
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?CA Technologies
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOCA Technologies
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...CA Technologies
 
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesPre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesCA Technologies
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationCA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
 
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...CA Technologies
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementCA Technologies
 
Tracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APMTracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APMCA Technologies
 
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...CA Technologies
 

Tendances (20)

Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadTech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
 
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
 
Pre-Con Ed: Five Easy Steps for Migrating to CA Directory
Pre-Con Ed: Five Easy Steps for Migrating to CA DirectoryPre-Con Ed: Five Easy Steps for Migrating to CA Directory
Pre-Con Ed: Five Easy Steps for Migrating to CA Directory
 
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
 
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementPre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
 
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesPre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced Authentication
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
 
Tracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APMTracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APM
 
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
 

En vedette

Tech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity ModelTech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity ModelCA Technologies
 
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...CA Technologies
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsPre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsCA Technologies
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...CA Technologies
 
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education The Importance of Mainframe Security Education
The Importance of Mainframe Security Education CA Technologies
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...CA Technologies
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumCA Technologies
 

En vedette (7)

Tech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity ModelTech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity Model
 
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsPre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
 
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
 

Similaire à Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the Risk of Breach

Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesCA Technologies
 
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM MaturityIt’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM MaturityCA Technologies
 
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...CA Technologies
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...CA Technologies
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadCA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Customer Use Case: Real-World Automation in Retail
Customer Use Case: Real-World Automation in RetailCustomer Use Case: Real-World Automation in Retail
Customer Use Case: Real-World Automation in RetailCA Technologies
 
Client Portal: Delivering the Complete Wealth Picture
Client Portal: Delivering the Complete Wealth PictureClient Portal: Delivering the Complete Wealth Picture
Client Portal: Delivering the Complete Wealth PictureSS&C Advent
 
Intelligent Mainframe Management and the Drive Toward No-Touch Automation
Intelligent Mainframe Management and the Drive Toward No-Touch Automation Intelligent Mainframe Management and the Drive Toward No-Touch Automation
Intelligent Mainframe Management and the Drive Toward No-Touch Automation CA Technologies
 
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCase Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCA Technologies
 
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...CA Technologies
 
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessPre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessCA Technologies
 
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...CA Technologies
 
Case Study: Taking IT Asset Management to the Next Level With Process Automation
Case Study: Taking IT Asset Management to the Next Level With Process AutomationCase Study: Taking IT Asset Management to the Next Level With Process Automation
Case Study: Taking IT Asset Management to the Next Level With Process AutomationCA Technologies
 
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...CA Technologies
 
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...CA Technologies
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeForgeRock
 
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...Ivanti
 
B2B & Growth Hacking: drawing from startups for online lead generation
B2B & Growth Hacking: drawing from startups for online lead generationB2B & Growth Hacking: drawing from startups for online lead generation
B2B & Growth Hacking: drawing from startups for online lead generationVanksen
 
Why most websites fail and how you can make sure yours doesn't| Gareth Dunlop...
Why most websites fail and how you can make sure yours doesn't| Gareth Dunlop...Why most websites fail and how you can make sure yours doesn't| Gareth Dunlop...
Why most websites fail and how you can make sure yours doesn't| Gareth Dunlop...Enterprise Ireland
 

Similaire à Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the Risk of Breach (20)

Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
 
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM MaturityIt’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
 
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Customer Use Case: Real-World Automation in Retail
Customer Use Case: Real-World Automation in RetailCustomer Use Case: Real-World Automation in Retail
Customer Use Case: Real-World Automation in Retail
 
Client Portal: Delivering the Complete Wealth Picture
Client Portal: Delivering the Complete Wealth PictureClient Portal: Delivering the Complete Wealth Picture
Client Portal: Delivering the Complete Wealth Picture
 
Intelligent Mainframe Management and the Drive Toward No-Touch Automation
Intelligent Mainframe Management and the Drive Toward No-Touch Automation Intelligent Mainframe Management and the Drive Toward No-Touch Automation
Intelligent Mainframe Management and the Drive Toward No-Touch Automation
 
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCase Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
 
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
 
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessPre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
 
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
Tech Talk: CA Live API Creator MythBuster: Low Code is a Toy, not Enterprise ...
 
Case Study: Taking IT Asset Management to the Next Level With Process Automation
Case Study: Taking IT Asset Management to the Next Level With Process AutomationCase Study: Taking IT Asset Management to the Next Level With Process Automation
Case Study: Taking IT Asset Management to the Next Level With Process Automation
 
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
 
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
 
B2B & Growth Hacking: drawing from startups for online lead generation
B2B & Growth Hacking: drawing from startups for online lead generationB2B & Growth Hacking: drawing from startups for online lead generation
B2B & Growth Hacking: drawing from startups for online lead generation
 
Why most websites fail and how you can make sure yours doesn't| Gareth Dunlop...
Why most websites fail and how you can make sure yours doesn't| Gareth Dunlop...Why most websites fail and how you can make sure yours doesn't| Gareth Dunlop...
Why most websites fail and how you can make sure yours doesn't| Gareth Dunlop...
 

Plus de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Plus de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the Risk of Breach