Designing and Establishing a Mature PAM Ecosystem for Reducing Risk in Your Organisation
- LANGUAGE: English DATE: Tuesday, September 01, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
What makes a PAM strategy different from enterprise password management or Identity Access Management? What are the first actions you should take to protect your privileged accounts in the shortest amount of time? And, how has the definition of “PAM Basics” changed as the industry and cyber risks have evolved?
This webinar is a must for teams launching PAM initiatives to ensure they start on the right foot. As you progress on your PAM journey, there’s always something new to learn. If you’ve already begun your PAM rollout, this event is a great chance to confirm you’re setting the appropriate milestones and see how others demonstrate success.
Getting a fresh perspective will help you learn new ways to break down this complex topic so you can communicate the value of PAM effectively to company leadership and business users.
Join this webinar and you will learn:
- The importance of a proper risk assessment to any PAM rollout or revision
- The need to support both legacy and cloud apps and services in any PAM deployment
- How DevOps, Microservices and digital transformation are changing the way we do PAM
- Why privileged accounts are likely to increase exponentially and what you can do to manage them in the future
In the first part of the webinar, KuppingerCole Senior Analyst Paul Fisher will look at the current state of the PAM market and how vendors are responding to these changes.
He will be joined by Joseph Carson, CISSP, CSPO. Cybersecurity Expert at Thycotic.
ThycoticCentrify is a leading cloud identity security vendor, enabling digital transformation at scale. ThycoticCentrify's industry-leading privileged access management (PAM) solutions reduce risk, complexity, and cost while securing organizations' data, devices, and code across cloud, on-premises, and hybrid environments. ThycoticCentrify is trusted by over 14,000 leading organizations around the globe including over half of the Fortune 100, and customers include the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.
In the era when data has replaced oil as the most valuable commodity, APIs have become an important logistical foundation of modern digital business. As a result, APIs have also become a popular target for cyber attackers, and therefore effective API security is essential. However, focusing only on the operational aspects is no longer enough.