Privileged Access Management
Facebook Twitter LinkedIn

Privileged Access Management

Combined Session
Thursday, May 12, 2022 15:30—16:30
Location: A03-04

PAM Panel Session

Volume and type of privileged accounts and their access is continuously growing, e.g. in Cloud environments or in DevOps environments. While ‘traditional’ PAM managing access  to on-prem resources is often understood and established today, many organizations are facing the challenge of a bigger PAM picture.

Joseph Carson
Joseph Carson
Delinea
Joseph Carson is an award-winning cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specialising in blockchain, endpoint security,...
Brian Chappell
Brian Chappell
BeyondTrust
Brian has more than 30 years of IT and cybersecurity experience in a career that has spanned system integrators, PC and Software vendors, and high-tech multi-nationals. He has held senior roles in...
Nir Greenberg
Nir Greenberg
Illusive Networks
Nir is a resident technical expert, making sure customer needs are understood and met across a wide variety of industry verticals and use cases. Previously, he spent seven years with Check...
Dr. Phillip Messerschmidt
Dr. Phillip Messerschmidt
KuppingerCole
Dr. Phillip Messerschmidt joined KuppingerCole in January 2021 as Advisor & Analyst. Prior to this, he worked for various management consultancies, primarily advising major banks on challenges...
Matthias Reinwarth
Matthias Reinwarth
KuppingerCole
Matthias is Head of Advisory and oversees and leads the KuppingerCole advisory team. Additionally he acts as lead advisor in various customer projects. As head of the IAM practice, Matthias...

PAM I^3 - Implementation, Integration and Intelligence about Privileged Access Management

A look at how 5 of Canada’s biggest financial institutions have tackled the challenge of Privileged Access Management. Sharing similar requirements all went down paths of successful deployments of technologies to protect their clients, and workforce while providing a more efficient user experience for day to day activities.   A look at the 5 common steps to success.

PAM I^3  - Implementation, Integration and Intelligence about Privileged Access Management
Event Recording
PAM I^3 - Implementation, Integration and Intelligence about Privileged Access Management
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
PAM I^3  - Implementation, Integration and Intelligence about Privileged Access Management
Presentation deck
PAM I^3 - Implementation, Integration and Intelligence about Privileged Access Management
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Denny Prvu
Denny Prvu
Royal Bank of Canada
Denny Prvu has been fortunate enough to work around the world with public and private sector organizations as a strategist, architect, and communicator on identity, security, and privacy topics for...

PAM for the People

The cyberssecurity approaches and strategies that works well for a multinational with a large and well funded cybersecurity department may not be as applicable for a mid sized company where the security department may be a single person.
Still if the partner company that delivers the cheese to a retailer falls to a cybersecurity attack there is simply no cheese to sell to the customers so the retailer not only looses money but also fails at their most basic task. So how do we as multinationals help our partners with implementing basic controls such as PAM in a way that works in their business reality?
In this session we will be looking at how you as a relatively cybersecurity mature company can do to help your less mature partners. It is also suitable for persons who has been asked to launch a cybersecurity or PAM program without been given the full resource to execute a full program.

PAM for the People
Event Recording
PAM for the People
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
PAM for the People
Presentation deck
PAM for the People
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Martin Sandren
Martin Sandren
AholdDelhaize
Martin Sandren is a security architect and delivery lead with over eighteen years of experience of various information security related roles. Primarily focused on security architecture and digital...

Tickets

On-Demand Access
Re-live EIC 2022
€300
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address