Scott Hesford, Senior Director, Solutions Engineering, APJ, BeyondTrust
Improving their maturity within the Essential Eight is considered daunting for many organisations. Strategies such as application control, restricting admin privileges and user application hardening are seen as difficult to implement effectively without impacting employee productivity.Â
However, security technologies such as Privileged Access Management (PAM) can help organisations bridge the gap for a number of requirements of the Essential Eight, including the above three. Modern PAM solutions can also provide compensating controls on other elements of the Essential Eight.
Join this discussion amongst peers of the Essential Eight, how organisations are aligning to it and how PAM can support those strategies.Â
Attend this roundtable and you will:
- Hear from your peers on how they are approaching the Essential Eight in their organisationsÂ
- Know how Privileged Access Management maps against the eight strategies, including the November 2023 update
- Learn some of the best practices around implementing parts of the Essential Eight.