Designing and Establishing a Mature PAM Ecosystem for Reducing Risk in Your Organisation
- LANGUAGE: English DATE: Tuesday, September 01, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
What makes a PAM strategy different from enterprise password management or Identity Access Management? What are the first actions you should take to protect your privileged accounts in the shortest amount of time? And, how has the definition of “PAM Basics” changed as the industry and cyber risks have evolved?
This webinar is a must for teams launching PAM initiatives to ensure they start on the right foot. As you progress on your PAM journey, there’s always something new to learn. If you’ve already begun your PAM rollout, this event is a great chance to confirm you’re setting the appropriate milestones and see how others demonstrate success.
Getting a fresh perspective will help you learn new ways to break down this complex topic so you can communicate the value of PAM effectively to company leadership and business users.
Join this webinar and you will learn:
- The importance of a proper risk assessment to any PAM rollout or revision
- The need to support both legacy and cloud apps and services in any PAM deployment
- How DevOps, Microservices and digital transformation are changing the way we do PAM
- Why privileged accounts are likely to increase exponentially and what you can do to manage them in the future
In the first part of the webinar, KuppingerCole Senior Analyst Paul Fisher will look at the current state of the PAM market and how vendors are responding to these changes.
He will be joined by Joseph Carson, CISSP, CSPO. Cybersecurity Expert at Thycotic.
The easiest to manage and most readily adopted privilege management solutions are powered by Thycotic. Thycotic’s security tools empower over 12,500 organizations, from small businesses to the Fortune 500, to limit privileged account risk, implement least privilege policies, control applications, and demonstrate compliance. Thycotic makes enterprise-level privilege management accessible for everyone by eliminating dependency on overly complex security tools and prioritizing productivity, flexibility and control. Headquartered in Washington, D.C., Thycotic operates worldwide with offices in the UK, Germany and Australia. For more information, please visit https://thycotic.com.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.