Privileged Access Management
Facebook Twitter LinkedIn

Privileged Access Management

Combined Session
Wednesday, May 15, 2019 17:30—18:30
Location: ALPSEE

Stealing the Crown Jewels

Today most companies have PAM solutions in place to protect the most sensitive systems and information repositories. A correctly designed and implemented PAM system is a huge security asset but it also provides a very juicy target for not only hackers but also for fraudulent employees who wants to bypass the protections of the PAM system and commit the perfect crime with a built in alibi.

This talk looks at the result from penetration testings of PAM systems at major enterprises and highlights some of the issues we have encountered. The talk also discusses typical architectural challenges and trade offs especially around how you integrate your PAM solution into your identity management and identity governance solution.

Key takeaways:

Stealing the Crown Jewels
Presentation deck
Stealing the Crown Jewels
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Jur Huisman
Jur Huisman
Ahold Delhaize
Jur Huisman is a seasoned project manager with over 30 years of IT experience. He has built his expertise on various products and disciplines, with a focus on maintenance (using SAP) and IT network...
Martin Sandren
Martin Sandren
Nixu
Martin Sandren is a CISSP and SABSA certified security professional with over fifteen years of experience of various information security related roles. Primarily focused on security architecture...

Panel: Leveraging Privileged Access Management Solutions for Enterprise

Compromising privileged accounts can lead to loss of valuable information. Therefore, Privileged Access Management is becoming a top priority for enterprises. Companies must implement solutions which reduce risk but also add business value, which can be difficult. Both, stakeholders and account managers need to be on board with this transition, before selecting a specific PAM tool. In this panel, speakers will discuss a potential PAM roadmap for an enterprise and specific solutions.

Anil Bhandari
Anil Bhandari
ARCON TechSolutions
Anil Bhandari is an inspired innovator, technologist, and thought leader in Information Risk Management. He serves as a Mentor & Thought Leader and provides his invaluable insights for the...
Didier Cohen
Didier Cohen
WALLIX
As Director of Strategy for WALLIX, Didier Cohen is responsible for developing strategic alliances for the group. He has spent most of his career in the IT & Telecommunications industry,...
Morey J. Haber
Morey J. Haber
BeyondTrust
Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three Apress books: Privileged...
David Lieberman
David Lieberman
Semperis
David is an accomplished fifteen plus year Business Development and Sales executive who is well versed in both “start-up” and large company development. David’s experience...
Vibhuti Sinha
Vibhuti Sinha
Saviynt
As Saviynt's Chief Cloud Officer, Vibhuti Sinha, is the owner of Saviynt's cloud platform and products. He leads the strategy and innovation of cloud security products and technology partnerships....
Subscribe for updates
Please provide your email address