Privileged Access Management (PAM) Boot Camp
Defining & Implementing a Privileged Access Management (PAM) Program for your Digital Enterprise
In the age of digital transformation, change is the only thing that remains and therefore, our organizations must constantly reinvent themselves by being agile and more innovative. Emerging technology initiatives such as the digital workplace, DevOps, security automation and the Internet of Things continue to expand the attack surface of organizations as well as introduce new digital risks. To stay competitive and compliant, organizations must actively seek newer ways of assessing and managing security risks without disrupting the business. Security leaders, therefore, have an urgent need to constantly improve upon the security posture of the organization by identifying and implementing appropriate controls to prevent such threats.
Privileged Access Management (PAM), over the past few years, has become one of the most relevant areas of Cyber Security associated with IAM (Identity and Access Management) that deals with identifying, securing and managing privileged credentials and the resulting access across an Organization’s IT environment. The PAM boot camp is an intensive training program helping you to prevent security breaches and credential thefts through defining and implementing the right cybersecurity controls for privileged users and privileged access in your organization.
Get more for less:
Boot camps are part of the KC MASTER CLASS - a virtual multi-channel online classroom where you can ask for individual support from our analysts, attend interactive online sessions, read up-to-date research documents, and take a final exam to obtain a certificate for the acquired skills.
Privileged Access Management (PAM) Boot Camp Agenda
|Wednesday, August 19, 2020|
|10:00 - 10:15||
Welcome / Introduction and Agenda Overview
|10:15 - 12:00||
Recap: Drivers & Benefits, Segments Capabilities & Requirements
10:15 - 11:15
Breakout Session: Identifying and Managing the Risks of Privileged Access in a Model Organization
11:15 - 12:00
|12:30 - 13:30||
|13:00 - 14:45||
Pam Architectures, Policies, Processes and Organization (Recap & Beyond in a Hybrid Reality)
13:00 - 13:45
Breakout Session: Mitigating the Risks. Identifying Complementary Measures
13:45 - 14:45
|14:45 - 15:00||
|15:00 - 16:45||
Breakout Session: After the First 100 Days of Pam (Beyond Shared Passwords and Session Management). Scoping. Prioritization. Roadmap definition.
15:00 - 16:00
PAM - A Market Overview (PF)
16:00 - 16:45
|16:45 - 17:00||
- Registration fee:
- Contact person:
Ms. Elene Petriashvili
- Aug 19, 2020 10:00-17:00
The Antivirus has been proclaimed dead years ago – you’ve probably heard those stories many times. But did you realize that the EDR (Endpoint Detection and Response), which was once supposed to address all its shortcomings, isn’t doing well either? After all, with the sheer number and complexity of modern cyber threats, what’s the point of detecting each one if you have neither time nor qualified manpower to analyze and mitigate them before they turn into major disruptions?
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.