Event Recording

Panel | Managing Zero Standing Access

Show description
Speakers
Horst Bliedung
Head of IAM Product Management
Atos
Horst Bliedung
Horst is a Senior IAM Expert with 30+ years of extensive experience and a proven track record in business leadership, sales, partner management, product management, and marketing. Technology focuses are application software, communications, cloud, cyber security, and more specifically IAM....
View profile
Paul Fisher
Lead Analyst
KuppingerCole
Paul Fisher
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...
View profile
Vadim Lander
Chief Technology Officer
Broadcom Software, IMS Division
Vadim Lander
Vadim Lander is currently the Chief Technology Officer and Distinguished Engineer for Symantec Identity Security at Broadcom. Vadim is a recognized IAM expert, having architected, developed, and led multiple, highly scalable IAM solutions to become industry leaders. He was...
View profile
Brandon Nolan
Global Digital Identity Lead
Avanade
Brandon Nolan
As Avanade’s  Digital Identity Lead, Brandon primarily focuses on assisting clients recovering from cyber incidents, while working closely with many Fortune 500 CISO’s providing Identity focused solutions effective in reducing risk, raising awareness, and protecting...
View profile
Patrick Parker
Founder and CEO
EmpowerID
Patrick Parker
Patrick Parker is the founder and CEO of EmpowerID, a company specializing in Identity and Access Management for over 20 years. He pioneered the unique use of Role and Attribute-Based Access Control within an Identity Orchestration framework to realize a modern and comprehensive vision of...
View profile
Top related content
Webinar Recording
Returning (or finally bringing?) Identity and Access Management (IAM) to the User
Mar 22, 2012

KuppingerCole Webinar recording

Webinar Recording
Controlling and Monitoring Administrative Access to Enterprise IT
Jun 29, 2015
Managing and monitoring privileged access to Enterprise Systems has turned out to be one of the most important aspects of IT security for almost any type of organization.
Event Recording
Workshop | Zero Trust & Modern Digital Workplaces
Sep 16, 2021
Event Recording
Panel | Best Practices to Get Started on Your Zero Trust Journey
Mar 23, 2022

As organizations continue to grapple with security issues, a 'zero-trust' approach to cybersecurity has been touted as a potential solution to enhance enterprise security. However, taking on Zero Trust architectures can be an overwhelming experience for even the most seasoned cybersecurity professionals. This panel session features security leaders who go beyond network principles reliant on the “never trust, always verify” philosophy to focus on effective deployment of a Zero Trust strategy at your organization.

 

Webinar Recording
Implementing Zero Trust With Privileged Access Management Platforms
Dec 16, 2022

Among the many approaches to do that, Zero Trust is one where organizations apply the principle of “never trust – always verify”. Since Zero Trust is not a single product or solution, implementing processes that work accordingly can be a challenge to IT teams that want to keep their privileged accounts safe. Modern Privileged Access Management (PAM) platforms can help with these challenges.

Paul Fisher, Lead Analyst at KuppingerCole will look at why standing privileges are a risk to modern multi-cloud and hybrid architectures and how Zero Trust can help in reducing standing privileges. Moreover, he will explain why advanced PAM platforms can assist with establishing a Zero Trust posture and how to move PAM to decentralized operations.

Joe Burke, Chief Architect, PAM, in the Symantec Identity Security Group, proposes organizations should rethink how to implement Zero Trust security for secrets, privileges, and privileged accounts. He will elaborate on factors that IT decision-makers should look for in Zero Trust-enabling PAM solutions. Among these are the time to implement, low operational overhead, scalability and performance, ecosystem integrability, as well as coarse and fine-grained authorization enforcement.

Webinar Recording
Privileged Access Management - the Focal Point for Your IAM Today
Mar 28, 2019

PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today.

Blog
Access Management Trends Towards a Zero-Trust Paradigm
Jun 22, 2021
Event Recording
The Path to Zero Trust by Securing Privileged Identities
May 11, 2022

Attacks on identity and privileged access pathways are relentless, with the stakes of a cyber-breach never higher. Securing privileged identity within your organisation has never been more important as it is the foundation of a successful Zero Trust implementation. Zero Trust is built on foundations that are essential across your cybersecurity strategy, delivering greater value from existing cyber investments. In this session, we will outline:

  • Why protecting identities is fundamental to achieving Zero Trust
  • Practical steps you can take NOW to secure your privileged identities
  • The pivotal role Privileged Access Management plays in achieving Zero Trust
Event Recording
PAM I^3 - Implementation, Integration and Intelligence about Privileged Access Management
May 12, 2022

A look at how 5 of Canada’s biggest financial institutions have tackled the challenge of Privileged Access Management. Sharing similar requirements all went down paths of successful deployments of technologies to protect their clients, and workforce while providing a more efficient user experience for day to day activities.   A look at the 5 common steps to success.