Securing your Hybrid IT Environment with Privileged Access Management

  • LANGUAGE: English DATE: Thursday, June 28, 2018 TIME: 4:00pm CEST, 3:00pm BST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Securing your Hybrid IT Environment with Privileged Access Management

As your business grows, so does your IT footprint – both on-premises and in the cloud. This adds to the overall complexity of managing access to the newly acquired IT assets and applications in addition to existing ones. The conventional approaches of managing privileged access using controls native to the individual operating systems, and other internal access policies, are not only cumbersome to manage but add to the security risks in today’s hybrid IT environment.

IAM leaders need to assess security risks associated with unmanaged and uncontrolled privileged access across more dynamic IT environment to ensure the appropriate PAM controls are chosen and deployed to address these risks.

In this webinar, we will discuss:

  1. The growing challenges and complexities associated with managing privileged access
  2. How PAM tools can be your answer to control the growing risks and complexities with managing privileged access
  3. What security and risk management leaders should do to ensure an effective privileged access management solution both for IT and the business

In the first part of the webinar, Anmol Singh, Lead Analyst at KuppingerCole, will discuss how emerging IT landscape is creating additional challenges for organizations to identify, track and control the privileged access to IT assets and sensitive data. Anmol Singh will also provide insights into the benefits of moving away from conventional methods of managing privileged access.

In the second part of the webinar, David Dingwall, Senior Cybersecurity Strategist at HelpSystems will discuss which PAM controls are most effective and relevant in managing certain types of privileged access and what IAM leaders should be doing in order to ensure the implementation of a successful and future-proof PAM solution


David has been embedded for three decades within the Identity and Access Management (IAM) marketplace, and with other cybersecurity infrastructures to support multi-national organizations’ business operations and audit requirements. His roles have previously included Consulting Architect,...

Anmol Singh is a lead analyst at KuppingerCole. He brings more than 14 years of cybersecurity experience focused on identity and access management and related technologies. Through his career, Mr. Singh has worked in several positions ranging from IAM engineering to architecture, consulting,...

Lead Sponsor

HelpSystems aligns IT and business goals to help organizations build a competitive edge. Our software and services monitor and automate processes, encrypt and secure data, and provide easy access to the information people need. More than 13,000 organizations around the world rely on HelpSystems to make IT lives easier and keep business running smoothly. Learn more at

Watch now


Trending Videos

Next Webinar


Taking the Risk Out of Key Digital Business Enablers: APIs

Application Programming Interfaces (APIs) are among the foundations of modern digital business. APIs are found everywhere due to a rapid growth in demand to expose and consume APIs to enable new business models and connect with partners and customers, but APIs are also a security risk that businesses can’t afford to ignore.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00