Advanced Privileged Access Management & New Trends

Advanced Privileged Access Management & New Trends

Thursday, August 20 | 10:00 - 04:00 pm CEST

About this Event
This KCLive Event focusses on next-generation PAM solutions and approaches. Get answers to important questions related to endpoint privilege management and its capabilities, DevOps and PAM, and go through successful PAM projects. Speakers will also discuss the role of Artificial Intelligence in PAM and how it can strengthen its solutions.

Key Topics

The increasing momentum of digital transformation requires businesses to be resilient and agile. While offering newer and faster services and experiencing digital expansion, companies are facing security risks that are becoming more complex and sophisticated. Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. This KCLive event will be dedicated to its role in the cybersecurity framework and more advanced PAM tools and methods.

Endpoint Detection and Response (EDR) solutions are a good starting point for protecting endpoint devices but can be insufficient in many cases. Endpoint Privilege Management (EPM) offers capabilities to manage threats associated with local administrative rights on laptops, tablets, smartphones, or other endpoints. The importance of EPM and its implementation challenges, as well as the integration in overall cybersecurity strategy, will be discussed at this KCLive event.

With the onset of digital transformation, organizations have seen the number of privileged users multiply as new types of operations. One of those is DevOps with its needed to access privileged accounts and vendors are responding to these demands by introducing new modules for DevOps. Learn more about the challenges and solutions of PAM for DevOps at this KCLive event.

Both, PAM vendors and buyers should always investigate new technologies that may improve the efficacy of existing solutions. Artificial Intelligence is one of such technologies. AI-powered advanced analytics tools could have a lot more answers about a person trying to gain access to a privileged account. Hear more about AI and PAM at our sessions.

Increased level and number of cyber threats require the utilization of more advanced PAM tools (privileged user analytics, risk-based session monitoring, advanced threat protection, etc.) alongside standard capabilities. These will be presented and discussed throughout the KCLive event agenda. Furthermore, best practice presentations from enterprise companies will highlight the challenges facing these companies and discuss their success stories.

Reasons to Attend
The size of the mobile workforce is increasing, more so during the current pandemic crisis. Tried and tested enterprise networks are being replaced with the new mixed reality. With these increasing challenges, compromised Privileged Accounts with inadequate protection can pose a high risk to companies.

Therefore, having the right Privileged Access Management (PAM) strategy and expertise becoming essential for enterprise cybersecurity teams. Companies must ask themselves, what can the advanced PAM tools really achieve and what compensatory controls can the cybersecurity teams apply for optimal cyber defense.

Live vs. On-Demand
Join us live on the event's platform on August 20 to watch the live stream, find like-minded business contacts (via matchmaking feature), network with other attendees, ask questions to speakers, participate in polls and to share your thoughts on the wall of ideas. We offer all registrants an on-demand access to download presentation slides, watch recordings, and download free research as soon as the event has finished.


Please note that presentations and other event materials are only available to registered participants.
You need to log in to be able to download them.

Thursday, August 20, 2020
10:00 - 10:10 Welcome Session
Lauren Zuber, Project Manager, KuppingerCole Analysts
10:10 - 10:30 In the Future PAM will Become Embedded in the IT Stack
Paul Fisher, Lead Analyst, KuppingerCole
10:30 - 10:50 Privileged Access Management – Motivation and Benefits
John Ovali, Security Architect IAM, Uniper
10:50 - 11:10 How to Solve the Top 5 Access Management Challenges in Hybrid Cloud Environments
David Wishart, VP Global Partnerships, SSH Communications Security
11:10 - 11:30 Interview with Dave Wishart
Paul Fisher, Lead Analyst, KuppingerCole
David Wishart, VP Global Partnerships, SSH Communications Security
11:30 - 11:50 How to Wreak Your PAM Project
Theresa Laager, IT Security Consultant, Layer8 Consulting
11:50 - 12:40 Lunch Break
12:40 - 13:00 Implementing PAM, How Did We Get Support and Buy-In From the Organisation?
Jens Bertel Nykjær, IAM Solution Architect, Danfoss
13:00 - 13:20 Are You Doing Privileged Access Management Right?
Pooja Agrawalla, VP - IAM, Wells Fargo
13:20 - 13:40 Privileged Access Cloud Security: Insider Tips and Best Practices
Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic
13:40 - 14:00 Cloud PAM on the Rise: The Future is Now
Vibhuti Sinha, Chief Cloud Officer, Saviynt
14:00 - 14:20 Cloud PAM: Challenges, Considerations And Approach
Rohit Nambiar, Director IAM, Information Security, Equifax
14:20 - 14:40 Break
14:40 - 15:00 Panel - Addressing Enterprise Security Challenges with PAM
Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic
Vibhuti Sinha, Chief Cloud Officer, Saviynt
David Wishart, VP Global Partnerships, SSH Communications Security
15:00 - 15:20 Success Factors PAM Projects
Alexander Koerner, Partner | Principal Business Consultant, Cybrex
15:20 - 15:40 Planning and Deploying Identity Federation based PAM Using Certificates
Kari Nousiainen, IT Manager, Metso Outotec
Thursday, August 20, 2020 Boot Camp
13:00-18:00 Privileged Access Management (PAM) Boot Camp
Defining & Implementing a Privileged Access Management (PAM) Program for your Digital Enterprise


Paul Fisher , Senior Analyst KuppingerCole
Matthias Reinwarth , Lead Advisor and Senior Analyst at KuppingerCole



Pooja Agrawalla has led & strategized multiple, large and complex enterprise solutions in Identity & Access Management (IAM) including Privileged Access Management (PAM). In her current role, she leads the delivery and operations of IAM India organization for WellsFargo.   

Anne Bailey is an analyst covering emerging technologies such as blockchain and artificial intelligence, and helps synthesize the implications for companies, industries, and markets. She holds a Bachelor from Pacific Lutheran University, a Master’s Certificate from Johns Hopkins-Nanjing...

Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...

Theresa Laager founded Layer 8 Consulting 10 years ago and as a Managing Consultant she is working on projects with relation to Privileged Access Management, Multi-Factor Authentication, Endpoint Security and other Cyber-Security related topics. In the past she also covered the DACH Region as a...

Rohit Nambiar has 15 years of IT Security experience most recently as Director IAM (Identity And Access Management) at Equifax Inc where he is responsible for building and leading cross functional teams while executing IAM roadmaps and delivering critical security programs. Prior to...

Kari Nousiainen has over 15 years’ experience working in cybersecurity in various consultant and product management roles for world leading organisations such as Fujitsu, GlobalSign and Vorna ID, His current role is IT Manager for Metso Outotec and is responsible for leading identity and...

Jens Bertel Nykjær, has 10+ years of experience with IAM and security. Jens Bertel has worked in larger global companies and been lead on IAM projects. He is today working as IAM Solution Architect with responsibility for PAM and IAM platforms in Danfoss. Primary focus, is the development...

John Ovali has been Architect and Project Manager for Identity & Access Management for more than 20 years. His experience grew by multiple global projects with large scale corporations roles within leading IDM software vendors. Today he acts as a strategic architect for security, especially...

As Saviynt's Chief Cloud Officer, Vibhuti Sinha, is the owner of Saviynt's cloud platform and products. He leads the strategy and innovation of cloud security products and technology partnerships. He has 17+ years of experience in defining and building security models and solutions for...

Lauren joined KuppingerCole’s Events Team in August 2018. As a Project Manager, she is responsible for the planning, implementation and follow up of diverse live, hybrid, and virtual event formats and supports the sponsors, attendees and service contractors in all matters. When she...

Attend Live Register Only  
Download presentation slides
Watch recordings
Download free research documents
Watch live stream
Find like-minded business contacts
Chat with other attendees
Question speakers
Participate in polls
Share your thoughts on the Wall of Ideas

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00

Platinum Sponsor

Gold Sponsors