Prime Discount
expires in
Register Now

Agenda

Privileged Access

Privileged Access

Combined Session
Thursday, June 06, 2024 14:30—15:30

Is Least Privileged Even Possible?
14:30—14:45
 

Are role models and least privileged at odds? When defining roles, we tend to grant more access in one role to avoid having to create multiple similar roles or managing exceptions. So where does that leave our pursuit of implementing a least privileged access model in a zero trust environment?

Hans-Robert Vermeulen
Identity Strategist
SailPoint
Hans-Robert is an Identity Strategist and evangelist for SailPoint. He has been with SailPoint for over twelve years and spends a lot of his time talking to prospects and customers on how an...
Findings From the 2024 PAM Leadership Compass
14:45—15:00
 

The annual PAM Leadership Compass is one of the biggest and most eagerly awaited reports from KuppingerCole. Compared to other analyst companies, the KuppingerCole report stands out for its breadth and understanding of the whole PAM market, not just a few large players.

In this session, the author of the report and Lead Analyst for PAM, Paul will highlight the main findings from the report. This will not focus only on the Leaders but the choice offered to buyers as a whole. He will also speak about the trends that are shaking up the PAM market; the renewed focus on identity management, better understanding of the needs of developer orgs and the influence of CIEM and ITDR on capabilities being offered.

By attending this session, delegates will have a better understanding of the current PAM market, which platforms stand out and why (not always the Leaders) and how securing privilege access is now essential.

Paul Fisher
Lead Analyst
KuppingerCole
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry...
PAM Design Patterns and Anti-Patterns: Assessing Your Organization's Best Practices
15:00—15:15
 

In today's cybersecurity landscape, organizations are increasingly recognizing the importance of implementing robust Privileged Access Management (PAM) programs. This recognition is primarily driven by regulatory requirements and the growing pressure from malicious actors. However, despite the availability of mature baseline capabilities for PAM products in the market, the implementation of privileged access often falls behind leading practices in typical organizations.

In this talk, we will explore the world of PAM design patterns and anti-patterns, with a specific focus on major use cases. We will explore typical patterns such as isolating accounts, systems, credentials, and networks. Additionally, we will discuss the various options available for defining privileged assets and access, as well as the potential for running Identity Governance and Administration (IGA) projects in parallel with PAM.

A fundamental aspect to consider is the concept of tier models and security domains. We will explore the role of different intermediaries, including Jump Hosts, Privileged Access Workstations (PAWs), and Agents, and their varying security properties.

Furthermore, we will address the often overlooked aspect of managing Secure Shell (SSH) keys within PAM. Lastly, we will touch upon the importance of having robust procedures in place to handle critical situations in emergency mode.

By understanding these PAM design patterns, organizations can assess their current practices and identify areas for improvement. This talk aims to provide valuable insights and practical guidance for organizations seeking to enhance their PAM programs and align with leading industry practices.

Rainer Hörbe
Senior Manager
KPMG
Rainer has been involved in Identity and Access Management (IAM) since 2000, working in various roles such as architect, policy writer, software developer, and security consultant. He has...
Myths of Least Privilege Management (POLP)
15:15—15:30
 

The principle of Least Privilege (PoLP) requires granting identities only the minimum permissions needed to perform their tasks. However, many technical and human factors make PoLP difficult to achieve.

In this talk, we will go through the various dimensions which need to be considered when we are implementing PoLP and what are the challenges in achieving it. While the obvious consideration for least privilege is the set of permissions, we show why factors such as grant timing and duration, and scaling across multiple cloud providers and SaaS applications are important as well.

We show how the lack of automation makes achieving PoLP inefficient, error-prone, and unscalable, and discuss strategies for continuous least privilege.

Finally, we show how to balance security and productivity to ensure widespread adoption of PoLP.

Kamal Muralidharan
Chief Technologist
Andromeda Security
Kamal Congevaram Muralidharan has 20+ years of software experience, including engineering roles at PayPal, eBay, and Oracle. Prior to his role as Co-founder and Chief Technologist at Andromeda,...
Secure your ticket
Be quick before the Prime Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch