Menu

Complimentary Webinar: Get Help with Privileged Access Management (PAM)

You’re invited to join our complimentary webinar on privileged access management (PAM). Please click here to register.

Title: Harnessing Privileged Access Management (PAM) to Defend Core Digital Assets Against a Breach

When: October 16, 2015 at 2:00 PM EDT / 11:00 AM PDT

Topic Overview:

Privileged Access Management (PAM) solutions are rapidly gaining traction in the market. Even hardened enterprise networks have vulnerabilities that can be exploited. End user networks, mobile devices and content cannot be 100% protected against phishing and malware attacks. To protect core IT assets, organizations must tackle over-provisioning of privileges and sloppy credential management within their IT environments.

How do you manage privileged accounts in your organization? Regulations like PCI/DSS, SOX, NERC CIP, FFIEC and others demand you address them. Beyond compliance, PAM can reduce risks by hardening your environment in ways no other solution can. But you have to start with a realistic expectation that PAM products are unusually difficult to deploy. In this webinar, Security Architects Partners will give you an unbiased perspective on PAM’s challenges that is absent from vendor presentations. Our consultants will take you through actual deployment experiences and lessons learned. We’ll distill the good practices you need to be successful, covering:

  • PAM definitions and specific security and compliance drivers
  • Core features: Password vault, session manager, application credential manager and fine-grained privilege control
  • The PAM market landscape and major vendors such as BeyondTrust, CA, CyberArk, Dell, Lieberman Software and Exceedium
  • How to integrate PAM with identity management, service ticketing and security monitoring systems
  • Avoiding availability, performance, issues with emergency “break glass” processes and other gotchas

Who Should Attend?

CISO’s, CIO’s, Senior VP’s, IT Security Directors and Managers, Identity Management Architects or Specialists, IT Operations Managers, Network Managers, CTO’s, Risk Managers and Audit/Compliance Officers or Staff.

Dan Blum – Principal Consultant & Managing Partner

An internationally-recognized expert in security, privacy, cloud computing and identity management. Former Golden Quill award-winning VP and Distinguished Analyst at Gartner Research. Mr. Blum has extensive consulting experience on numerous enterprise IT Security and Identity Management projects within commercial, government and higher-education organizations.

Doug Moench – Senior Security & Identity Management Consultant 

Mr. Moench is a CISSP specializing in the development of security and identity strategies, architectures and management solutions. Mr. Moench has over 30 years consulting experience with developing technology and process recommendations for minimizing risk, improving security procedures, and strengthening collaboration with partners using standards-based technologies.

Doug Simmons – Principal Security & Identity Consultant 
Former VP of Gartner Research’s Security and Identity Management consulting practice. Mr. Simmons brings more than 25 years of in-depth experience in IT security, risk management and identity management. Mr. Simmons has both performed and project managed hundreds of engagements for large global enterprise clients in multiple vertical industries, government agencies and Higher Education institutions.

REGISTER HERE

Subscribe to Blog Notifications...  HERE
Tag Cloud
Archives