Early-bird Discount
expires in
Register Now

Agenda

Privileged Access

Privileged Access

Combined Session
Thursday, June 06, 2024 14:30—15:30
Location: A 05-06

Is Least Privileged Even Possible?
14:30—14:45
 

Are role models and least privileged at odds? When defining roles, we tend to grant more access in one role to avoid having to create multiple similar roles or managing exceptions. So where does that leave our pursuit of implementing a least privileged access model in a zero trust environment?

Hans-Robert Vermeulen
Identity Strategist
SailPoint
Hans-Robert is an Identity Strategist and evangelist for SailPoint. He has been with SailPoint for over twelve years and spends a lot of his time talking to prospects and customers on how an...
Snapshot on Trends in Privileged Access Management
14:45—15:00
 

Paul Fisher is KuppingerColes’s resident expert on the PAM. In this session, he will highlight new findings from his most recent research into a market that continues to develop in line with identity and infrastructure demands. Paul will speak about the trends that are shaking up the PAM market; the renewed focus on identity management, better understanding of the needs of developer groups and the influence of CIEM and ITDR on capabilities being offered. He will also offer a glimpse into the future with his theory on why privileged access and data governance tools must come together.

By attending this session, delegates will have a better understanding of the current PAM market and its future direction to make better buying decisions.

Paul Fisher
Lead Analyst
KuppingerCole
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry...
PAM Design Patterns and Anti-Patterns: Assessing Your Organization's Best Practices
15:00—15:15
 

In today's cybersecurity landscape, organizations are increasingly recognizing the importance of implementing robust Privileged Access Management (PAM) programs. This recognition is primarily driven by regulatory requirements and the growing pressure from malicious actors. However, despite the availability of mature baseline capabilities for PAM products in the market, the implementation of privileged access often falls behind leading practices in typical organizations.

In this talk, we will explore the world of PAM design patterns and anti-patterns, with a specific focus on major use cases. We will explore typical patterns such as isolating accounts, systems, credentials, and networks. Additionally, we will discuss the various options available for defining privileged assets and access, as well as the potential for running Identity Governance and Administration (IGA) projects in parallel with PAM.

A fundamental aspect to consider is the concept of tier models and security domains. We will explore the role of different intermediaries, including Jump Hosts, Privileged Access Workstations (PAWs), and Agents, and their varying security properties.

Furthermore, we will address the often overlooked aspect of managing Secure Shell (SSH) keys within PAM. Lastly, we will touch upon the importance of having robust procedures in place to handle critical situations in emergency mode.

By understanding these PAM design patterns, organizations can assess their current practices and identify areas for improvement. This talk aims to provide valuable insights and practical guidance for organizations seeking to enhance their PAM programs and align with leading industry practices.

Rainer Hörbe
Senior Manager
KPMG
Rainer has been involved in Identity and Access Management (IAM) since 2000, working in various roles such as architect, policy writer, software developer, and security consultant. He has...
Myths of Least Privilege Management (POLP)
15:15—15:30
 

The principle of Least Privilege (PoLP) requires granting identities only the minimum permissions needed to perform their tasks. However, many technical and human factors make PoLP difficult to achieve.

In this talk, we will go through the various dimensions which need to be considered when we are implementing PoLP and what are the challenges in achieving it. While the obvious consideration for least privilege is the set of permissions, we show why factors such as grant timing and duration, and scaling across multiple cloud providers and SaaS applications are important as well.

We show how the lack of automation makes achieving PoLP inefficient, error-prone, and unscalable, and discuss strategies for continuous least privilege.

Finally, we show how to balance security and productivity to ensure widespread adoption of PoLP.

Ashish Shah
Co-founder and Chief Product Officer
Andromeda Security
Ashish is a product and GTM executive with 20+ years of experience across startups and large enterprises. Currently, he is the co-founder and Chief Product Officer at Andromeda Security....
Secure your ticket
Be quick before the Early-bird Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch