Implementing Zero Trust with Privileged Access Management Platforms

Webinar
Implementing Zero Trust with Privileged Access Management Platforms

Thursday, December 15, 2022 | 4:00pm CET, 11:00am EST, 8:00am PST
Busy that time and day? Register anyway to watch the recording

Register Now

Attend this webinar to:

  • Why securing your privileged accounts is key to organizational cyber resilience.
  • How to implement Zero Trust principles based on modern PAM platforms.
  • About factors IT decision-makers should consider when looking for PAM solutions.

Why Standing Privileges Are a Risk to Modern Hybrid Multi-Cloud Architectures

There is no debate about the fact that ransomware is the fastest-growing kind of cybercrime. Due to their wide range of access rights and thus potential ransom leverage, privileged accounts are at the top of the target list for cybercriminals. Therefore, organizations need to pay special attention to securing these kinds of accounts.

Among the many approaches to do that, Zero Trust is one where organizations apply the principle of “never trust – always verify”. Since Zero Trust is not a single product or solution, implementing processes that work accordingly can be a challenge to IT teams that want to keep their privileged accounts safe. Modern Privileged Access Management (PAM) platforms can help with these challenges.

Speakers Contribution

Paul Fisher, Lead Analyst at KuppingerCole will look at why standing privileges are a risk to modern multi-cloud and hybrid architectures and how Zero Trust can help in reducing standing privileges. Moreover, he will explain why advanced PAM platforms can assist with establishing a Zero Trust posture and how to move PAM to decentralized operations.

Joe Burke, Chief Architect, PAM, in the Symantec Identity Security Group, proposes organizations should rethink how to implement Zero Trust security for secrets, privileges, and privileged accounts. He will elaborate on factors that IT decision-makers should look for in Zero Trust-enabling PAM solutions. Among these are the time to implement, low operational overhead, scalability and performance, ecosystem integrability, as well as coarse and fine-grained authorization enforcement.

 
 

Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...

Lead Sponsor

         FAQ

Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.

To register for the webinar, you need to log in to your KuppingerCole User first. If you do not have a KuppingerCole User yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated email address.

Our webinars last approximately 50-60 minutes.

If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.

We use the "GoToWebinar" software for the webinars. Simply click on "Join the webinar" in the registration confirmation. GoToWebinar will check directly on your computer if the software is already installed. If not, the installation process will start automatically, and you only need to confirm it.

To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. A combination of computer and telephone is also possible - you then follow the webinar via your Internet connection on the computer and dial in at the same time via telephone to listen to the moderator's explanations. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.

Our webinars are generally free of charge.

The recordings and presentation slides will be available on the website shortly after the webinar. An email will be sent to all registered users. In order to access the materials, you will need to log in to your KuppingerCole User first.

Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business. You do not need to deregister.

In some companies there are - mostly due to restrictive IT policies - problems with the installation. We regret this, of course, but cannot provide support in these cases. But no problem: You will receive the recording after the webinar, which you can watch in a normal web browser.