Privileged Access Management

  • TYPE: Combined Session DATE: Thursday, October 10, 2019 TIME: 13:00-14:00 LOCATION: Ballroom


Everyone knows that the password is dead, yet most companies are still struggling with them. With such a broad choice of strong authentication products on the market, what can possibly prevent their broader adoption?

If you are still thinking about finding the right balance between security and user experience, you’re doing it wrong. Even more, if you are still thinking about password replacement as just a matter of introducing strong authentication into your company, you really need to take a step back and see the big picture.

Going passwordless is a journey that requires a holistic strategy that incorporates not just user authentication, but expands to machine-to-machine communications as well – both for smart IoT devices as well as for legacy systems which are stuck with passwords for the rest of their lifecycle.

In this session, we’ll go beyond MFA into the realms of adaptive authentication, dynamic authorization, privileged access management and even cryptographic key management to dispel a few myths and outline the basic requirements for a comprehensive enterprise-wide passwordless strategy.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

A true least-privilege security model requires users, processes, applications, and systems, to have just enough rights and access—and for no longer than necessary—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited part of the equation. Today, powerful accounts with always-on (24x7) privileged access proliferate across enterprises. The privileges of these accounts are always in an active mode—for both legitimate use and misuse. Just in Time (JIT) Administration is an approach in which organizations dynamically assign privileges to accounts and assets to ensure identities only have the appropriate privileges when necessary, and for the least time necessary. With JIT PAM, your admin privileges are no longer always ripe for abuse, so the threat window is drastically condensed. For example, a typical always-on privileged account may be “privilege-active” 168 hours a week, versus just a couple dozen minutes using a JIT approach. Multiplying this effect across all your privileged accounts will have a truly massive impact on risk-reduction. Adopting JIT as part of your PAM approach means you can implement a true least privilege model across your enterprise.

Key takeaways: 

Attend this session to gain a firm understanding of how to:
• Significantly condense your organization’s threat surface by shifting from an always-on privileged access model to a JIT approach
• Identify use cases where JIT PAM is an absolutely necessity
• Choose and implement JIT PAM triggers, methodologies, and workflows that will immediately help you to drive down risk enterprise-wide
• Benefit from the integration between BeyondTrust PAM solutions and Identity Governance solutions to identify and reduce security risks across all your endpoints


Log in to download presentations:  


Session Links

Washington, D.C. - USA


CyberNext Summit 2019

Registration fee:
€1000.00 $1250.00 S$1600.00 11000.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • Oct 08 - 10, 2019 Washington, D.C. - USA