Privileged Access Management (PAM) Boot Camp

Privileged Access Management (PAM), over the past few years, has become one of the most relevant areas of cybersecurity associated with IAM (Identity and Access Management) that deals with identifying, securing and managing privileged credentials and the resulting access across an Organization’s IT environment. The PAM boot camp is an intensive 1-day online training program helping you to prevent security breaches and credential thefts through defining and implementing the right cybersecurity controls for privileged users and privileged access in your organization.
Format
A 1-day fully-online program tailored by our analysts to meet the market needs.
The theoretical part combined with dynamic interactive sessions.
Benefits
- Hands-on training with a maximum of 30 participants, which will enhance your knowledge and skills.
- Delve into the topic in an interactive way.
- Gain practical knowledge, interact with other participants through breakout rooms and smaller group works within the Bootcamp.
- Interact directly with our analysts.
- Get all the materials per email after completion.
- Approach our analysts per email if you have questions.
Target Group
The course is aimed at participants with background knowledge in Identity and access management (IAM), network technologies, security experts, and everyone who is interested in PAM or is planning to implement privileged access management(PAM) in their organization.
Want to Know More?
If you like to get more knowledge on PAM, organize Bootcamp for your team which is delivered flexibly to suit your organization, send us an email.
Agenda
Thursday, August 20, 2020 | |
13:00 - 13:20 |
Intro & Getting to Know Each Other |
13:20 - 14:30 |
Part 1 Basics: What are privileged accounts and PAM architecture Paul Fisher, Lead Analyst, KuppingerCole
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
13:20 - 14:05 Breakout session: Current Challenges and Pain Points 14:05 - 14:25 Results 14:25 - 14:30 |
14:30 - 14:50 |
Break |
14:50 - 16:10 |
Part 2 The business case for PAM (drivers and benefits) Paul Fisher, Lead Analyst, KuppingerCole
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
14:50 - 15:40 Breakout session: Mitigating immediate risks. Identifying complementary measures 15:40 - 16:00 Results 16:00 - 16:10 |
16:10 - 16:30 |
Break |
16:30 - 18:00 |
Part 3 Efficiently building your PAM requirements list and deployment Paul Fisher, Lead Analyst, KuppingerCole
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
16:30 - 17:05 Breakout Session: Prioritizing identified challenges (Scoping PAM and roadmap definition) 17:05 - 17:25 Results 17:25 - 17:30 The Market View (LC) Paul Fisher, Lead Analyst, KuppingerCole
17:30 - 18:00 |
Speakers
Privileged Access Management (PAM) Boot Camp
- Language:
- English
- Contact person:
-
Ms. Elene Petriashvili
ep@kuppingercole.com
- Aug 20, 2020 13:00-18:00
Trending Videos
Next Webinar
Effective Threat Detection for Enterprises Using SAP Applications
Jun 28, 2022
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.