Advanced Privileged Access Management & New Trends

Thursday, August 20 | 10:00 - 04:00 pm CEST
About this Event
This KCLive Event focusses on next-generation PAM solutions and approaches. Get answers to important questions related to endpoint privilege management and its capabilities, DevOps and PAM, and go through successful PAM projects. Speakers will also discuss the role of Artificial Intelligence in PAM and how it can strengthen its solutions.
Key Topics
The increasing momentum of digital transformation requires businesses to be resilient and agile. While offering newer and faster services and experiencing digital expansion, companies are facing security risks that are becoming more complex and sophisticated. Privileged Access Management (PAM) is one of the most important areas of risk management and data security in any organization. This KCLive event will be dedicated to its role in the cybersecurity framework and more advanced PAM tools and methods.
Endpoint Detection and Response (EDR) solutions are a good starting point for protecting endpoint devices but can be insufficient in many cases. Endpoint Privilege Management (EPM) offers capabilities to manage threats associated with local administrative rights on laptops, tablets, smartphones, or other endpoints. The importance of EPM and its implementation challenges, as well as the integration in overall cybersecurity strategy, will be discussed at this KCLive event.
With the onset of digital transformation, organizations have seen the number of privileged users multiply as new types of operations. One of those is DevOps with its needed to access privileged accounts and vendors are responding to these demands by introducing new modules for DevOps. Learn more about the challenges and solutions of PAM for DevOps at this KCLive event.
Both, PAM vendors and buyers should always investigate new technologies that may improve the efficacy of existing solutions. Artificial Intelligence is one of such technologies. AI-powered advanced analytics tools could have a lot more answers about a person trying to gain access to a privileged account. Hear more about AI and PAM at our sessions.
Increased level and number of cyber threats require the utilization of more advanced PAM tools (privileged user analytics, risk-based session monitoring, advanced threat protection, etc.) alongside standard capabilities. These will be presented and discussed throughout the KCLive event agenda. Furthermore, best practice presentations from enterprise companies will highlight the challenges facing these companies and discuss their success stories.
Reasons to Attend
The size of the mobile workforce is increasing, more so during the current pandemic crisis. Tried and tested enterprise networks are being replaced with the new mixed reality. With these increasing challenges, compromised Privileged Accounts with inadequate protection can pose a high risk to companies.
Therefore, having the right Privileged Access Management (PAM) strategy and expertise becoming essential for enterprise cybersecurity teams. Companies must ask themselves, what can the advanced PAM tools really achieve and what compensatory controls can the cybersecurity teams apply for optimal cyber defense.
Live vs. On-Demand
Join us live on the event's platform on August 20 to watch the live stream, find like-minded business contacts (via matchmaking feature), network with other attendees, ask questions to speakers, participate in polls and to share your thoughts on the wall of ideas. We offer all registrants an on-demand access to download presentation slides, watch recordings, and download free research as soon as the event has finished.
Agenda
Please note that presentations and other event materials are only available to registered participants.
You need to log in to be able to download them.
Thursday, August 20, 2020 | |
10:00 - 10:10 |
Welcome Session Lauren Zuber, Event Manager, KuppingerCole
|
10:10 - 10:30 |
In the Future PAM will Become Embedded in the IT Stack Paul Fisher, Senior Analyst, KuppingerCole
|
10:30 - 10:50 |
Privileged Access Management – Motivation and Benefits John Ovali, Security Architect IAM, Uniper
|
10:50 - 11:10 |
How to Solve the Top 5 Access Management Challenges in Hybrid Cloud Environments David Wishart, VP Global Partnerships, SSH Communications Security
|
11:10 - 11:30 |
Interview with Dave Wishart Paul Fisher, Senior Analyst, KuppingerCole
David Wishart, VP Global Partnerships, SSH Communications Security
|
11:30 - 11:50 |
How to Wreak Your PAM Project Theresa Laager, IT Security Consultant, Layer8 Consulting
|
11:50 - 12:40 |
Lunch Break |
12:40 - 13:00 |
Implementing PAM, How Did We Get Support and Buy-In From the Organisation? Jens Bertel Nykjær, IAM Solution Architect, Danfoss
|
13:00 - 13:20 |
Are You Doing Privileged Access Management Right? Pooja Agrawalla, VP - IAM, Wells Fargo
|
13:20 - 13:40 |
Privileged Access Cloud Security: Insider Tips and Best Practices Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic
|
13:40 - 14:00 |
Cloud PAM on the Rise: The Future is Now Vibhuti Sinha, Chief Cloud Officer, Saviynt
|
14:00 - 14:20 |
Cloud PAM: Challenges, Considerations And Approach Rohit Nambiar, Director IAM, Information Security, Equifax
|
14:20 - 14:40 |
Break |
14:40 - 15:00 |
Panel - Addressing Enterprise Security Challenges with PAM Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic
Vibhuti Sinha, Chief Cloud Officer, Saviynt
David Wishart, VP Global Partnerships, SSH Communications Security
|
15:00 - 15:20 |
Success Factors PAM Projects Alexander Koerner, Partner | Principal Business Consultant, Cybrex
|
15:20 - 15:40 |
Planning and Deploying Identity Federation based PAM Using Certificates Kari Nousiainen, IT Manager, Metso Outotec
|
Thursday, August 20, 2020 Boot Camp | ||
13:00-18:00 |
Privileged Access Management (PAM) Boot Camp
Defining & Implementing a Privileged Access Management (PAM) Program for your Digital Enterprise
Paul Fisher , Senior Analyst KuppingerCole
Matthias Reinwarth , Lead Advisor and Senior Analyst at KuppingerCole
|
Speakers
Attend Live | Register Only | |
✔ | ✔ |
Download presentation slides
|
✔ | ✔ |
Watch recordings
|
✔ | ✔ |
Download free research documents
|
✔ | ✘ |
Watch live stream
|
✔ | ✘ |
Find like-minded business contacts
|
✔ | ✘ |
Chat with other attendees
|
✔ | ✘ |
Question speakers
|
✔ | ✘ |
Participate in polls
|
✔ | ✘ |
Share your thoughts on the Wall of Ideas
|
Become a Sponsor
Platinum Sponsor
Gold Sponsors