The Five Security Secrets Your IT Administrators Don't Want You to Know

Philip Lieberman, of Lieberman Software, to Present at InfoSec Europe 2012

Philip Lieberman, president and CEO of Lieberman Software
Philip Lieberman, president and CEO of Lieberman Software
  • Philip Lieberman, president and CEO of Lieberman Software
    Philip Lieberman, president and CEO of Lieberman Software
    Philip Lieberman, president and CEO of Lieberman Software
    Philip Lieberman, president and CEO of Lieberman Software

Philip Lieberman, president and CEO of Lieberman Software Corporation, will present “The Five Security Secrets Your IT Administrators Don’t Want You to Know” at InfoSecurity Europe 2012 in London. The session will take place on April 26 at 10:00 am in the Technical Theater.

“As valued members of any organization, IT administrators work every day to keep the infrastructure up and available,” Lieberman said. “But with demands to reduce operational costs, IT administrators often take more shortcuts than upper management might expect - especially regarding security.”

Lieberman’s presentation will describe little known facts about the state of today’s IT, such as:

•    Many IT professionals can still access critical systems on the network, even long after leaving the organization;
•    Rank and file IT staff often have the same access to sensitive financial data as the CFO;
•    Most organizations likely don’t know precisely who on the staff have the right credentials to read, copy and alter data;
•    IT auditors don’t necessarily know everywhere to look to discover security holes.

“Fundamentally, the security of an organization hinges on how well IT balances convenience with controls and accountability,” Lieberman said. “All too often IT is granted free reign to operate under its own rules when it comes to security.”

During this interactive half hour session, Lieberman will provide recommendations on how organizations can improve IT accountability through segregation of duties and auditing controls. The presentation will also describe potential solutions, such as privileged identity management software, which can automatically track privileged logins, delegate access and change credentials for each account after use.