Privileged Access Management

  • TYPE: Combined Session DATE: Wednesday, May 15, 2019 TIME: 17:30-18:30 LOCATION: ALPSEE
Track

Sessions:

Today most companies have PAM solutions in place to protect the most sensitive systems and information repositories. A correctly designed and implemented PAM system is a huge security asset but it also provides a very juicy target for not only hackers but also for fraudulent employees who wants to bypass the protections of the PAM system and commit the perfect crime with a built in alibi.

This talk looks at the result from penetration testings of PAM systems at major enterprises and highlights some of the issues we have encountered. The talk also discusses typical architectural challenges and trade offs especially around how you integrate your PAM solution into your identity management and identity governance solution.

Key takeaways:

  • What are the major attack surfaces in a PAM system?
  • How to lock down a PAM system
  • Architectural considerations including integrations into IAM and IAG

Speakers:

Jur Huisman is a seasoned project manager with over 30 years of IT experience. He has built his expertise on various products and disciplines, with a focus on maintenance (using SAP) and IT network infrastructure. He has worked in various branches, ranging from aircraft maintenance, oil and gas,...

Martin Sandren is a CISSP and SABSA certified security professional with over fifteen years of experience of various information security related roles. Primarily focused on security architecture and identity and access management including large scale (20+ million users) customer IAM and...


Compromising privileged accounts can lead to loss of valuable information. Therefore, Privileged Access Management is becoming a top priority for enterprises. Companies must implement solutions which reduce risk but also add business value, which can be difficult. Both, stakeholders and account managers need to be on board with this transition, before selecting a specific PAM tool. In this panel, speakers will discuss a potential PAM roadmap for an enterprise and specific solutions.


Speakers:

As director of strategy for WALLIX, Didier Cohen is responsible for developing strategic alliances for the group. He has spent most of his career in the IT & Telecommunications industry, holding executive positions in sales and marketing for companies such as Nokia and Oberthur Technologies...

Karl Lankford is the Lead Solutions Architect, EMEA for BeyondTrust and has has worked at BeyondTrust for 4 years. He has acquired a wide-range of security experience and knowledge working with companies during the last 10 years across multiple industries and is a regular speaker at industry...

With more than 17 years of leadership and management experience in IT and more than 10 years of experience in Identity and Access Management, Reena Parekh is an associate director at KPMG. She is one of the lead architects in the Identity and Access Management Group focusing on deploying new...

As Saviynt's Chief Cloud Officer, Vibhuti Sinha, is the owner of Saviynt's cloud platform and products of Saviynt. As the owner of Saviynt's cloud platform, he is responsible to deliver Saviynt's IGA and cloud security offerings as services to its customers across the globe. He is also...

More panelists to be announced


Moderators:

Quick Links

Register now!

And get your early bird discount

Stay Connected

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2019

Language:
English
Registration fee:
€2100.00
€1600.00 till 17.04.2019
$2625.00
$2000.00 till 17.04.2019
S$3360.00
S$2560.00 till 17.04.2019
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 14 - 17, 2019 Munich, Germany
Register now!

Partners

The European Identity & Cloud Conference 2019 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00