Privileged Access Management
- TYPE: Track START DATE: Thursday, May 06, 2010 START TIME: 10:30 LOCATION: Helios
Date: Thursday, May 06, 2010 Time: 10:30-11:30
Privileged Access Management (PAM) put into Context – Access Governance Strategy or just Tactics?
Martin Kuppinger, KuppingerCole
Panel: Privileged Identities - Identify, Delegate, Enforce, Audit
Jochen Koehler, CyberArk • Philip Lieberman, Lieberman Software • Nimrod Vax, BigID
High-profile data breaches emphasize the need to maintain and safeguard privileged accounts, but oftentimes, nothing is done to effectively limit exposure of highly sensitive data. There are four key processes that can help organizations regain control of privileged accounts in a cost-effective manner. Identifying, delegating, enforcing and auditing (I.D.E.A.) can improve security and operational efficiency, take control of privileged accounts and close security gaps within the...
Date: Thursday, May 06, 2010 Time: 11:30-12:30
Privileged Identity and Access Management at Daimler (TSS)
Daniel Rätsch, Daimler TSS
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 04 - 07, 2010 Munich