Highlights
- The concept of privileged access – the risks associated with this access and activity
- Why this is important for all enterprises (especially telecom companies)?
- What kind of controls are needed?
- What kind of solutions are available?
- How to plan for a solution?