The "Hard Truths" About Managing Administrative and Application Identities
![Cover Image](https://cdn.ttgtmedia.com/bitpipe/covers/1216247997_288_lg.jpg)
Mounting regulatory pressure drives governance, risk and compliance initiatives with key focus on identity management. At the core of IT infrastructure are thousands of non-end-user identities: up and down the stack in hardware, network, operating-systems and databases, used anonymously by administrators, and embedded in application code. This session will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.