The "Hard Truths" About Managing Administrative and Application Identities
Mounting regulatory pressure drives governance, risk and compliance initiatives with key focus on identity management. At the core of IT infrastructure are thousands of non-end-user identities: up and down the stack in hardware, network, operating-systems and databases, used anonymously by administrators, and embedded in application code. This session will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.