Designing and Establishing a Mature PAM Ecosystem for Reducing Risk in Your Organisation
- LANGUAGE: English DATE: Tuesday, September 01, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
What makes a PAM strategy different from enterprise password management or Identity Access Management? What are the first actions you should take to protect your privileged accounts in the shortest amount of time? And, how has the definition of “PAM Basics” changed as the industry and cyber risks have evolved?
This webinar is a must for teams launching PAM initiatives to ensure they start on the right foot. As you progress on your PAM journey, there’s always something new to learn. If you’ve already begun your PAM rollout, this event is a great chance to confirm you’re setting the appropriate milestones and see how others demonstrate success.
Getting a fresh perspective will help you learn new ways to break down this complex topic so you can communicate the value of PAM effectively to company leadership and business users.
Join this webinar and you will learn:
- The importance of a proper risk assessment to any PAM rollout or revision
- The need to support both legacy and cloud apps and services in any PAM deployment
- How DevOps, Microservices and digital transformation are changing the way we do PAM
- Why privileged accounts are likely to increase exponentially and what you can do to manage them in the future
In the first part of the webinar, KuppingerCole Senior Analyst Paul Fisher will look at the current state of the PAM market and how vendors are responding to these changes.
He will be joined by Joseph Carson, CISSP, CSPO. Cybersecurity Expert at Thycotic.
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Our solutions put privileged access at the center of cybersecurity by defining the boundaries of access. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.