Privileged Access Management (PAM) Boot Camp

Privileged Access Management (PAM) Boot Camp Defining & Implementing a Privileged Access Management (PAM) Program for your Digital Enterprise
In the age of digital transformation, our organizations must constantly reinvent themselves by being agile and more innovative. Emerging technology initiatives such as the digital workplace, DevOps, security automation, and the Internet of Things continue to expand the attack surface of organizations as well as introduce new digital risks. To stay competitive and compliant, organizations must actively seek newer ways of assessing and managing security risks without disrupting the business. Security leaders, therefore, have an urgent need to constantly improve upon the security posture of the organization by identifying and implementing appropriate controls to prevent such threats. KuppingerCole's online Boot camps offer an intensive and dynamic 1-day training program addressing the main challenges in the industry.

Privileged Access Management (PAM), over the past few years, has become one of the most relevant areas of cybersecurity associated with IAM (Identity and Access Management) that deals with identifying, securing and managing privileged credentials and the resulting access across an Organization’s IT environment. The PAM boot camp is an intensive 1-day online training program helping you to prevent security breaches and credential thefts through defining and implementing the right cybersecurity controls for privileged users and privileged access in your organization.


A 1-day fully-online program tailored by our analysts to meet the market needs.
The theoretical part combined with dynamic interactive sessions.


  • Hands-on training with a maximum of 30 participants, which will enhance your knowledge and skills.
  • Delve into the topic in an interactive way.
  • Gain practical knowledge, interact with other participants through breakout rooms and smaller group works within the Bootcamp.
  • Interact directly with our analysts.
  • Get all the materials per email after completion.
  • Approach our analysts per email if you have questions.

Target Group

The course is aimed at participants with background knowledge in Identity and access management (IAM), network technologies, security experts, and everyone who is interested in PAM or is planning to implement privileged access management(PAM) in their organization.

Want to Know More?

If you like to get more knowledge on PAM, organize Bootcamp for your team which is delivered flexibly to suit your organization, send us an email.


Thursday, August 20, 2020
13:00 - 13:20 Intro & Getting to Know Each Other
13:20 - 14:30 Part 1
Basics: What are privileged accounts and PAM architecture
Paul Fisher, Senior Analyst, KuppingerCole
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
13:20 - 14:05
Breakout session: Current Challenges and Pain Points
14:05 - 14:25
14:25 - 14:30
14:30 - 14:50 Break
14:50 - 16:10 Part 2
The business case for PAM (drivers and benefits)
Paul Fisher, Senior Analyst, KuppingerCole
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
14:50 - 15:40
Breakout session: Mitigating immediate risks. Identifying complementary measures
15:40 - 16:00
16:00 - 16:10
16:10 - 16:30 Break
16:30 - 18:00 Part 3
Efficiently building your PAM requirements list and deployment
Paul Fisher, Senior Analyst, KuppingerCole
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
16:30 - 17:05
Breakout Session: Prioritizing identified challenges (Scoping PAM and roadmap definition)
17:05 - 17:25
17:25 - 17:30
The Market View (LC)
Paul Fisher, Senior Analyst, KuppingerCole
17:30 - 18:00


Paul Fisher is a Senior Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...

Online Boot Camp

Privileged Access Management (PAM) Boot Camp

Contact person:

Ms. Elene Petriashvili
  • Aug 20, 2020 13:00-18:00

Popular Videos

Next Webinar


Information Protection in Cloud Services

Today’s economy is clearly driven by data. The most successful companies are those that can use this data to create useful information that enables them to get closer to their customers, to create new products and be more efficient. Cloud services are a key enabler in this, they allow the capture, storage, and exploitation of vast amounts of data without the need for capital expenditure. They enable the rapid development and deployment of new applications as well as the modernization of existing one.

Next Conference


European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from September 13 - 16, 2021, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00