Securing your Hybrid IT Environment with Privileged Access Management

  • LANGUAGE: English DATE: Thursday, June 28, 2018 TIME: 4:00pm CEST, 3:00pm BST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Securing your Hybrid IT Environment with Privileged Access Management
As your business grows, so does your IT footprint – both on-premises and in the cloud. This adds to the overall complexity of managing access to the newly acquired IT assets and applications in addition to existing ones. The conventional approaches of managing privileged access using controls native to the individual operating systems, and other internal access policies, are not only cumbersome to manage but add to the security risks in today’s hybrid IT environment.

IAM leaders need to assess security risks associated with unmanaged and uncontrolled privileged access across more dynamic IT environment to ensure the appropriate PAM controls are chosen and deployed to address these risks.

In this webinar, we will discuss:

  1. The growing challenges and complexities associated with managing privileged access
  2. How PAM tools can be your answer to control the growing risks and complexities with managing privileged access
  3. What security and risk management leaders should do to ensure an effective privileged access management solution both for IT and the business

In the first part of the webinar, Anmol Singh, Lead Analyst at KuppingerCole, will discuss how emerging IT landscape is creating additional challenges for organizations to identify, track and control the privileged access to IT assets and sensitive data. Anmol Singh will also provide insights into the benefits of moving away from conventional methods of managing privileged access.

In the second part of the webinar, David Dingwall, Senior Cybersecurity Strategist at HelpSystems will discuss which PAM controls are most effective and relevant in managing certain types of privileged access and what IAM leaders should be doing in order to ensure the implementation of a successful and future-proof PAM solution


David has been embedded for three decades within the Identity and Access Management (IAM) marketplace, and with other cybersecurity infrastructures to support multi-national organizations’ business operations and audit requirements. His roles have previously included Consulting Architect,...

Anmol Singh is a lead analyst at KuppingerCole (Asia) Pte Ltd. headquartered in Singapore. He brings more than 14 years of cybersecurity experience focused on identity and access management and related technologies. Through his career, Mr. Singh has worked in several positions ranging from IAM...

Lead Sponsor

HelpSystems aligns IT and business goals to help organizations build a competitive edge. Our software and services monitor and automate processes, encrypt and secure data, and provide easy access to the information people need. More than 13,000 organizations around the world rely on HelpSystems to make IT lives easier and keep business running smoothly. Learn more at

Watch now


Webinar presentation, KuppingerCole

Webinar presentation, HelpSystems

Webcast download

Popular Webcasts

Next Webinar


Assuring and Implementing Cybersecurity and Data Protection for Public Clouds

Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the enemy could enter.

Next Conference


Consumer Identity World EUROPE 2018

The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00