Back to All Events

Webinar: How To Properly Document User Access

  • JSCM Group 7930 West Kenton Circle. Suite 100 Huntersville, NC, 28078 (map)

At this moment, could you say with certainty that your organization knows exactly what access all employees have to company data? If someone changes roles, is there a way to track what access would need to be updated or revoked for their new position? Or, what if an employee with “privilege creep” has their account hacked? Even bigger, if an employee must be terminated, would someone know exactly what access needed to be revoked?

While our employees are our most valuable asset, they can also pose severe risk by having access to a lot of sensitive data if we aren’t doing everything we can to track that. If they leave on bad terms, we need to make sure we can effectively revoke that access as quickly as possible. Otherwise, we might have to learn an expensive lesson simply because we didn’t have the right procedures in place.

In our 2023 webinar series, we are focusing on how our policies and procedures can impact our security just as much as the tools we use. We are also discussing how security isn’t just an IT issue. While IT may be responsible for granting access to particular systems, managers and decision makers may ultimately have a better grasp of what systems and programs an individual should access. During our February webinar we will break down what it actually means to track user access and will discuss how the organization as a whole can take a more secure approach with how we grant access. In this webinar you will learn:

  • “Privilege Creep" and how to identify and reduce it 

  • Onboarding & Offboarding procedures 

  • Identifying & protecting your organization's "Crown Jewels"

* As an additional bonus we will provide templates for download to help you get started: Onboarding Process Swim Lane, System Access Form, and a User Access Policy

We will hold a live Q&A at the end of the webinar with Executive VP of Security & OperationsMadison Slater.