Event Recording

Sean Kennedy: Best Practices for a PAM Deployment

Speaker
Sean Kennedy
Director Enterprise IAM Strategy
Royal Bank of Canada
Sean Kennedy
Sean has been in the IT industry for 26 with the past 18 focused in the Identity and Access Management space.  Starting with one of the world’s largest Government to Citizen PKI implementations for the Government of Canada then moving on to create an IAM solution for citizens and...
View profile
Playlist
Operationalizing PAM
Event Recording
Raghu Dev: PAM for today’s Hybrid Enterprise – Practical Considerations
Apr 29, 2021
Event Recording
Paul Simmonds: Why Your Business Needs a Strategic Approach to PAM
Apr 29, 2021

Often missed as a niche part of IT, “admin” access is the holy grail for the bad-guys attacking your business. Thus, its crucial to understand why a strategic approach to PAM and Credential management will improve your corporate security posture. 

This talk will look at: 

  • The approach management should take to PAM 
  • The role of an HSM (High Security Module) in your PAM Strategy 
  • Why missing the “Sec” out of Dev-Ops make you the next target 
Event Recording
Filipi Pires: PAM: Is it a Culture? Project? Mindset or Platform?
Apr 29, 2021
Event Recording
Insights of a CISO: Interview with Frank Fischer
Apr 29, 2021
Event Recording
Marcus Scharra: Why PAM is crucial for DevOps security compliance
Apr 29, 2021
Event Recording
Joseph Carson: Your Journey to Privileged Access Security Maturity and Success
Apr 29, 2021

Privileged Access Management (PAM) continues to be a top priority for many organisations throughout the world. It is one of the most important solutions to help organisations reduce the risk from cyberattacks that target their privileged accounts and help move passwords into the background reducing cyber fatigue. A compromised privileged account enables an attacker to move around the network undetected, download malicious payloads, stage compromised servers and cause significant financial losses to their victims. 

Almost all users are now privileged users. With 80% of breaches involving the compromise of IT and business user credentials you must create a plan to reduce the risks posed by “overprivileged access” users, applications, and services.  When users are over-privileged it only takes attackers a few easy steps to become a full domain administrator.  We must make it more difficult that force attackers to take more risks increasing the chance of detecting them early before serious damage is done. 

One question for all organizations is how to get started. Where is the best place to begin for managing and protecting privileged access? It’s vital that you have have a solid strategy. Whether you’re starting a new PAM project or strengthening an existing Privileged Access Solution, Joseph Carson, Thycotic’s Chief Security Scientist and Advisory CISO will guide you step-by-step through planning your journey to privileged access security and introduce you to the PAM checklist that will help guide you to both maturity and success

Event Recording
Panel: Quo Vadis PAM?
Apr 29, 2021
Event Recording
Paul Fisher: Privileged Access Management in a Changing World
Apr 29, 2021

In this keynote address, Senior KuppingerCole Analyst Paul Fisher will explain how PAM will further develop to become a central component of modern IT infrastructures and enable frictionless but secure access to data and services. Included in this talk:

  • Changes in the PAM vendor landscape and impact on the market
  • How innovation by PAM vendors is creating a new generation of PAM platforms
  • The importance of managing secrets and the role that PAM must play in this
  • Why Endpoint Privilege Management should be top of mind for every CISO and CIO