The first session explores how the Risk Assessment features reveal the key weak points in your IT environment and help you prioritize their remediation.
Mark Petley will show how to:
- Review access rights to enforce least privilege
- Identify loose password policies to minimize the risk of account takeover
- Uncover inactive accounts that are ripe for compromise