PAM Best Practice
Facebook Twitter LinkedIn

PAM Best Practice

Combined Session
Thursday, May 11, 2023 15:30—16:30
Location: B 07-08

Privileged Access Management – Moving from Cost to Service Centre

A standardized approach to control privileged accounts can be valued as a profitable internal service.
While implementing Privileged Access Management (PAM) DKB concentrates on what kind of service delivery a PAM implementation can provide to its customers (our employees) to connect benefits for end-users and address identity security at the same time.
We call that Privileged Access Security Service.
From a technical and IAM point of view identity security can only be achieved by securing the respective digital identities and the assigned user accounts in the corresponding target systems.
In the area of IAM/PAM a comprehensive compliance level automatically results in a higher maturity of our information security management. Therefore, we reduce the non-financial risks not only by complying with regulatory requirements but also by adding effective security concepts – such as zero trust or least privilege – to our IAM/PAM ecosystem.
In this session the DKB approach to handle identities and accounts in the context of a Privileged Access Security Service will be presented.

Privileged Access Management – Moving from Cost to Service Centre
Event Recording
Privileged Access Management – Moving from Cost to Service Centre
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Privileged Access Management – Moving from Cost to Service Centre
Presentation deck
Privileged Access Management – Moving from Cost to Service Centre
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Felix Behringer
Felix Behringer
Deutsche Kreditbank AG
Felix Behringer is a certified Information Security Manager (CISM) with 7+ years of experience in IT Security. Felix leads the implementation of Privileged Access Managements (PAM) at Deutsche...

The Future role of PAM: Securing any Privileged Workload & Access

PAM (Privileged Access Management) is one of the established core disciplines within IAM. PAM also is the IAM discipline that is changing most from what it has been in the past.

On one hand, there is the impact of CIEM & DREAM, Cloud Infrastructure Entitlement Management or Dynamic Resource Entitlement & Access Management. This is about the expansion of PAM beyond humans accessing servers and selected applications towards any type of human and non-human (silicon) identity accessing any type of workload, from servers to dynamic cloud resources. This also implies an expansion from serving static data center infrastructures to dynamic workloads in today’s agile IT. PAM is changing, with more parties involved – a “PAMocracy”, as KuppingerCole Analyst Paul Fisher recently named it.

These changes also require expansions in integration to other IT services. There needs to be a dynamic governance approach, where IGA comes into play. It requires rethinking whether PAM tools really should care for authentication. There is no need for authentication point solutions in an age where most organizations have a strong Access Management solution with MFA, passwordless authentication and adaptive, risk- and context-based access in place. Finally, this new PAM must integrate with the DevOps tools chain for permanent updates about new code and the resources used as well as with IT Asset Management for an always up-to-date insight into the ever-changing, dynamic IT landscape that needs to be protected.

Also worth to think about is integration with further security solutions, beyond the standard SIEM/SOAR integration. AI-powered security solutions are one aspect. Integration to Cloud Security Posture Management is another example.

In this panel, the state and requirements on the future PAM will be discussed.

Matthias Bauer
Matthias Bauer
One Identity
Matthias Bauer is the Senior Manager of Product Development for Identity Manager and Senior architect for Identity Governance solutions. Prior to One Identity, Matthias was at Dell Security and...
Anil Bhandari
Anil Bhandari
ARCON TechSolutions
Anil Bhandari is an inspired innovator, technologist, and thought leader in Information Risk Management. He serves as a Mentor & Thought Leader and provides his invaluable insights for the...
Morey J. Haber
Morey J. Haber
BeyondTrust
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Cloud Attack Vectors, Privileged Attack Vectors, Asset...
Filipi Pires
Filipi Pires
senhasegura
I’ve been working as Security and Threat Researcher and Cybersecurity Advocate at senhasegura, Founder at Black&White Technology, Snyk Ambassador, Application Security Specialist and...
Frank Schmaering
Frank Schmaering
Saviynt
Frank Schmaering is an experienced speaker and tech enthusiast who specialises in IGA, GRC, PAM and authentication topics. He speaks passionately about identity governance, identity modernisation...

Tickets

On-Demand Access
Re-live EIC 2023
€500
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address