Locking Down Vendor Privileged Access Within Your Network 

Posted By: ILTA Video July 10, 2019 1:24 pm
Posted In: Recordings
07-10-2019 13:24

The legal industry faces an array of unique professional challenges: improving efficiency, ensuring confidentiality and maintaining client satisfaction. These challenges drive the use of new technology, which in turn changes the way law firms handle client information.

With 63% of data breaches being attributed to third-parties, this leads to the need for greater visibility and understanding of how third parties interact with sensitive data.

In this webinar, Tony Howlett and Justin Strackany will discuss why vendor privileged access can open your organization up to unlimited risk and best practices for managing third-party vendor access in a secure and efficient way. Join us to learn the following:

Lessons from recent third-party vendor-related data breaches
Why privileged access should be managed differently for vendors vs. employees
Tools and strategies to ensure third-party accountability without burdening overworked staff
Best practices for vendor access that allow you to identify who is coming into your network, control access and perform or respond to audits

**Data Risk in the Third-Party Ecosystem, Ponemon Report 2017

Tony Howlett – CISO, SecureLink
Justin Strackany - Chief Customer Officer, SecureLink

Sponsored by: SecureLink

Recorded on 7-9-19


0 Favorited
2 Files
mp4 file
Locking Down Vendor Privileged Access Within Your Network...mp4   55.62MB   1 version
Uploaded - 07-10-2019
pdf file
Locking Down Vendor Privileged Access Within Your Network...pdf   986K   1 version
Uploaded - 07-10-2019

Related Entries and Links

No Related Resource entered.

Tags and Keywords