Least Privilege 101: How to Start Your Least Privilege Cybersecurity Journey
With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords) you need to create a plan to eliminate "overprivileged access" by users, applications, and services.
Join Scott Shields, as he explains how to make a least privilege strategy successful in your organisation. Learn how to secure privileged credentials substantially reduce the risk of exploitation on endpoints while preserving user productivity.
Cyber Security, Hacking & Cyber Crime
Sales Engineer, Thycotic
Scott Shields is on a mission to help Enterprise orgs and MSPs understand the importance of Privileged Access Management from both a security and compliance point of view. An experienced security engineer, Scott has worked globally in a variety of IT fields and major enterprise projects.