Event Recording

Interview with Dave Wishart

Speakers
Paul Fisher
Lead Analyst
KuppingerCole
Paul Fisher
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...
View profile
David Wishart
VP Global Partnerships
SSH Communications Security
David Wishart
David is an enterprise security veteran with over 20 years of experience working in various enterprise architecture & engineering roles in the financial sector across London, New York, and Sydney. David has been intimately connected with SSH.COM since 2013 whilst working at Deutsche Bank to...
View profile
Top related content
Event Recording
Panel - Addressing Enterprise Security Challenges with PAM
Aug 21, 2020
Event Recording
David Wishart: How to Solve the Top 5 Access Management Challenges in Hybrid Cloud Environments
Aug 21, 2020

SSH.COM polled 625 IT and application development professionals across the United States, United Kingdom, France, and Germany to find out more about their working practices. We found that cloud and hybrid access solutions, including privileged access management software, slow down daily work for IT and application development professionals. These hurdles encourage users to take risky shortcuts and workarounds that put corporate IT data at risk. 

Join SSH.COM’s David Wishart, VP Global Partnerships, to learn:

  • Why the user experience of the privileged access management (PAM) solution matters for IT admins and developers in hybrid cloud environments
  • How just-in-time access, without leaving behind credentials, helps towards that goal while improving operational speed
Webinar Recording
Making Passwordless Authentication a Reality: The Hitchhiker’s Guide
Nov 16, 2022

In this webinar, Bojan Simic, founder and CEO at HYPR, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, share their insights and experience on what to consider when moving towards passwordless authentication, and making this a reality. They talk about solutions, but also cover the change management challenges involved when moving to a better (but different) authentication for thousands, hundreds of thousands, and even millions of users.

Topics they cover include

  • How to implement passwordless authentication without ending in a service desk nightmare
  • Remaining flexible: Building your passwordless solutions for continuous growth and innovation [this would be about allowing to add/replace tokens etc., but also scale]
  • Remaining strong: Flexibly adjust to the ever-changing threat landscape
  • Integration: Passwordless authentication as a good citizen in the IAM ecosystem
  • What to do beyond: Fraud Reduction, SOAR, and other approaches for identifying fraud and anomalies.
  • Convincing without overpromising: The internal marketing needed for successful rollouts of passwordless authentication.

Event Recording
Panel - The Future of Security & Why Prioritizing PAM is Important?
Jul 13, 2020
Webinar Recording
Decoding Advanced Privileged Access Management for Digital Environments - A conversation with Paul Fisher and Anil Bhandari
Nov 04, 2020

Did you know that privileged accounts are a major source of data leaks? These powerful administrative accounts provide access to business-critical information stored in applications and servers. A single instance of privileged password abuse can bring down the entire IT infrastructure. Therefore, enterprises are rethinking the access control mechanism to harden authentication.

Event Recording
Expert Chat: Interview with Denny Prvu
Sep 14, 2022

KC Analyst Paul Fisher interviews Denny Prvu, Global Director of IAM at Royal Bank of Canada.

Event Recording
Is the future really password-free and is it worth using a PAM solution?
Nov 15, 2023

Comprehensive protection of networks, system infrastructures, hardware and software, applications and data is part of every cyber security strategy. But what does this actually mean for identity and access management? Unloved for many years and repeatedly declared dead: passwords. Large IT companies have been promising us a password-free future for a long time. Is it really that easy to finally turn your back on passwords? The fact is that we have to deal with a large number of passwords every day in order to complete our professional and private tasks. Every password should be unique, highly complex and as long as possible. But what does the frightening everyday life with passwords look like today, what will it hopefully look like in the future and why it is essential to deal with the topic right now, explains Daniel Holzinger in his lecture.

Event Recording
Paul Fisher: In the Future PAM will Become Embedded in the IT Stack
Aug 21, 2020

Paul Fisher will expand on his analysis of how Privileged Access Management platforms will develop support for DevOps and other key users. This will mean that certain PAM functions will be embedded within the technology stack, opening up password free and secure access paths and enable rapid task fulfilment.

Event Recording
Panel | PAM
May 12, 2022