Privileged Access Management (PAM) Boot Camp

Privileged Access Management (PAM) Boot Camp

Defining & Implementing a Privileged Access Management (PAM) Program for your Digital Enterprise

The PAM boot camp is an intensive training program helping you to prevent security breaches and credential thefts through defining and implementing the right cybersecurity controls for privileged users and privileged access in your organization.
Register now

In the age of digital transformation, change is the only thing that remains and therefore, our organizations must constantly reinvent themselves by being agile and more innovative. Emerging technology initiatives such as the digital workplace, DevOps, security automation and the Internet of Things continue to expand the attack surface of organizations as well as introduce new digital risks. To stay competitive and compliant, organizations must actively seek newer ways of assessing and managing security risks without disrupting the business. Security leaders, therefore, have an urgent need to constantly improve upon the security posture of the organization by identifying and implementing appropriate controls to prevent such threats.

 

Privileged Access Management (PAM), over the past few years, has become one of the most relevant areas of Cyber Security associated with IAM (Identity and Access Management) that deals with identifying, securing and managing privileged credentials and the resulting access across an Organization’s IT environment. The PAM boot camp is an intensive training program helping you to prevent security breaches and credential thefts through defining and implementing the right cybersecurity controls for privileged users and privileged access in your organization.


Get more for less:

Boot camps are part of the KC MASTER CLASS - a virtual multi-channel online classroom where you can ask for individual support from our analysts, attend interactive online sessions, read up-to-date research documents, and take a final exam to obtain a certificate for the acquired skills.

Register for the PAM Masterclass and attend boot camp free of Charge

Privileged Access Management (PAM) Boot Camp Agenda

Wednesday, August 19, 2020
10:00 - 10:15 Welcome / Introduction and Agenda Overview 
10:15 - 12:00  Part 1
Recap: Drivers & Benefits, Segments Capabilities & Requirements
10:15 - 11:15
 Breakout Session: Identifying and Managing the Risks of Privileged Access in a Model Organization
11:15 - 12:00
12:30 - 13:30 Lunch Break
13:00 - 14:45 Part 2
Pam Architectures, Policies, Processes and Organization (Recap & Beyond in a Hybrid Reality)
13:00 - 13:45
Breakout Session: Mitigating the Risks. Identifying Complementary Measures
13:45 - 14:45 
14:45 - 15:00  Break
15:00 - 16:45  Part 3
Breakout Session: After the First 100 Days of Pam (Beyond Shared Passwords and Session Management). Scoping. Prioritization. Roadmap definition.
15:00 - 16:00
PAM - A Market Overview (PF)
16:00 - 16:45
16:45 - 17:00 Closing Remarks

Speakers

Warwick Ashford is a Senior Analyst who researches cybersecurity and identity-related topics, including emerging technologies and trends. He has been writing IT news and analysis as a journalist and editor since 2003, specialising in cybersecurity and privacy since 2012. Warwick has also...

Paul Fisher is a Senior Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...


Register now!


Online Boot Camp

Privileged Access Management (PAM) Boot Camp

Language:
English
Registration fee:
€280.00 $350.00 S$448.00 3080.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Ms. Elene Petriashvili
ep@kuppingercole.com
  • Aug 19, 2020 10:00-17:00
Register now!

Popular Webcasts

Next Webinar

Webinar

Protect, Detect, Respond, Mitigate: A Modern Security Paradigm for Modern Enterprises

The Antivirus has been proclaimed dead years ago – you’ve probably heard those stories many times. But did you realize that the EDR (Endpoint Detection and Response), which was once supposed to address all its shortcomings, isn’t doing well either? After all, with the sheer number and complexity of modern cyber threats, what’s the point of detecting each one if you have neither time nor qualified manpower to analyze and mitigate them before they turn into major disruptions?

Next Conference

Congress

European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00