Trust or Zero Trust? Working from Home and Going Beyond Privileged Access Management

Originally aired on Thursday, April 16 

Sign Up:

(*) denotes required form field(s)

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.



Least privilege is intended to prevent “over-privileged access” by users, applications or services to help reduce the risk of exploitation without impacting productivity or involving the IT help desk. It may help to think of least privilege by its other name - least authority - as it provides only enough authority for an entity to complete the job at hand. The least privilege model can also help curtail costs and increase efficiency. Join this webinar to understand how to maximize the benefits of least privilege, and learn just how much “privileged access” is too much. Join Thycotic’s Chief Security Scientist Joseph Carson and learn more about:

  • The Principle of Least Privilege
  • Realities of the Zero Trust Model 
  • Best practices to get back in control


Kimberly Underwood
Senior Editor
SIGNAL Magazine
View Biography
Joseph Carson
Chief Security Scientist & Advisory CISO
View Biography