CSN51: Mitigating Risk with Continuous Monitoring and Auditing of Privileged User Activity

Document created by beleslie on Aug 29, 2011Last modified by beleslie on Jul 8, 2014
Version 3Show Document
  • View in full screen mode

CSN51
Mitigating Risk with Continuous Monitoring and Auditing of Privileged User Activity
Speakers:
Quinn North, Security Information Architect, Verisk Analytics and Richard Weeks, VP, Business Development, Cyber-Ark Software
Learn how highly regulated organizations such as ISO are mitigating the risk of a data breach by integrating privileged identity management (PIM) and ArcSight SIEM technology. You will gain practical implementation knowledge and an understanding of the impact: real-time PIM anomaly detection; an increased, proactive information security posture; and a more granular privileged audit trail that shortens forensic analysis times – all while meeting strict regulatory compliance requirements.

 

Outcomes