Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned. Passing the quiz earns you one CPE credit from (ISC)².
View our Security School Course Catalog to view more lessons eligible for CPE credits.
About the author:
Andreas M. Antonopoulos is the former senior vice president of Nemertes Research.
In this part:
Access creep occurs when user privileges are not managed and monitored properly, and employees have access to more systems and applications than are required to do their jobs. This webcast will explain the data leak risks involved and how to limit access...
Effective role-based access control is vital for properly managing user access rights and enforcing access policies, but avoiding role sprawl can be challenging.
One of the most difficult areas of privileged user access management is avoiding access creep. John Burke covers how to keep privileged users in check.
Podcast: 5 Common Missteps with Trusted Insider Privileges
Insiders with elevated privileges are trusted with the keys to the kingdom; they're also prime targets for abuse from outsiders. In this podcast, you’ll learn five quick fixes to lessen the risk posed by trusted insiders.
Quiz: Monitoring your trusted insiders
How much have you learned about monitoring your privileged insiders? Test your knowledge in this short quiz.