In this session,we will walk through major use cases for Privilege Management. Which are the most common use cases, what to look at in particular and which specific features to stress-test in a PoC?
Jason Currill
ObserveIT
Jason leads ObserveIT in the European Theatre managing all aspects of the continued growth of ObserveIT. A passionate privacy advocate who has written many articles and papers on the impact of data...
Christian Goetz joined CyberArk in 2008 and is currently working as a Director of Professional Services in Germany. During the last 18 years as a professional consultant and software engineer...
Amar Singh is Senior Analyst at KuppingerCole, an C-level executive, information risk & GRC expert, CISO, writer industry speaker leading the global information risk management landscape with...
As Senior Director Edwin is responsible for Professional Services within Everett and acts as chairman of the Knowledge Management Team. He performs the Senior Supplier role in key projects as well.
Nathan has almost two decades of experience designing, implementing and managing both technical and non-technical solutions for IT and Information Security organizations. Throughout his career,...
Jason leads ObserveIT in the European Theatre managing all aspects of the continued growth of ObserveIT. A passionate privacy advocate who has written many articles and papers on the impact of data...
Christian Goetz joined CyberArk in 2008 and is currently working as a Director of Professional Services in Germany. During the last 18 years as a professional consultant and software engineer...
Amar Singh is Senior Analyst at KuppingerCole, an C-level executive, information risk & GRC expert, CISO, writer industry speaker leading the global information risk management landscape with...
As Senior Director Edwin is responsible for Professional Services within Everett and acts as chairman of the Knowledge Management Team. He performs the Senior Supplier role in key projects as well.
Nathan has almost two decades of experience designing, implementing and managing both technical and non-technical solutions for IT and Information Security organizations. Throughout his career,...