Privilege Management
Facebook Twitter LinkedIn

Strategies for Effective Privileged Access Management in Cloud Environments

Combined Session
Wednesday, May 10, 2017 14:30—15:30
Location: ALPSEE

As server and application infrastructures move to the cloud, one of the critical challenges for the enterprise IT organizations is to ensure they effectively and securely manage high privilege access to those systems. This requires having full visibility over who has access to what, how to enable and revoke access reliably, enabling access to users regardless of their location or device type, automate rotation of sensitive account passwords, SSH keys and SSL certificates and having mechanisms to monitor and record all user actions. This session presents typical scenarios with real world examples around this challenge and recommends a strategy to build an effective privileged access management program for enterprise IT organizations.

Key Takeaways

Scott Carlson
Scott Carlson
BeyondTrust
As Technical Fellow and Executive Security Advisor, Scott Carlson brings internal technical leadership to BeyondTrust, strategic guidance to our customers, and evangelism to the broader IT security...
William Culbert
William Culbert
Bomgar
William Culbert is the Director of Solutions Engineering EMEA with Bomgar, a leader in providing secure access solutions. William has worked at Bomgar for 5 years after previously being with HP...
Rajesh Ganesan
Rajesh Ganesan
ManageEngine, a division of Zoho Corp
Rajesh is passionate about building enterprise software products that are simple and pragmatic and bring real value to customers. In his twenty years with Zoho, Rajesh has built products in the...
Christian Götz
Christian Götz
CyberArk
Christian Goetz joined CyberArk in 2008 and is currently working as a Director of Professional Services in Germany. During the last 18 years as a professional consultant and software engineer...
Patrick Parker
Patrick Parker
EmpowerID
Patrick Parker is the founder and CEO of EmpowerID, a company specializing in Identity and Access Management for over 20 years. He pioneered the unique use of Role and Attribute-Based Access...
Barry Scott
Barry Scott
Centrify
Centrify’s Barry Scott has over 25 years of UNIX, Windows and Linux experience working for many major organisations in various Infrastructure Operations and Architecture roles, across...
Idan Shoham
Idan Shoham
Hitachi ID Systems
In his role as Chief Technology Officer, Idan Shoham is responsible for defining product and technology strategy and the overall development of Hitachi ID Systems solutions. Idan works closely with...
Subscribe for updates
Please provide your email address