Highlights
  • The concept of privileged access – the risks associated with this access and activity
  • Why this is important for all enterprises (especially telecom companies)?
  • What kind of controls are needed?
  • What kind of solutions are available?
  • How to plan for a solution?