Complimentary Webinar: Get Help with Privileged Access Management (PAM)
You’re invited to join our complimentary webinar on privileged access management (PAM). Please click here to register.
Title: Harnessing Privileged Access Management (PAM) to Defend Core Digital Assets Against a Breach
When: October 16, 2015 at 2:00 PM EDT / 11:00 AM PDT
Topic Overview:
Privileged Access Management (PAM) solutions are rapidly gaining traction in the market. Even hardened enterprise networks have vulnerabilities that can be exploited. End user networks, mobile devices and content cannot be 100% protected against phishing and malware attacks. To protect core IT assets, organizations must tackle over-provisioning of privileges and sloppy credential management within their IT environments.
How do you manage privileged accounts in your organization? Regulations like PCI/DSS, SOX, NERC CIP, FFIEC and others demand you address them. Beyond compliance, PAM can reduce risks by hardening your environment in ways no other solution can. But you have to start with a realistic expectation that PAM products are unusually difficult to deploy. In this webinar, Security Architects Partners will give you an unbiased perspective on PAM’s challenges that is absent from vendor presentations. Our consultants will take you through actual deployment experiences and lessons learned. We’ll distill the good practices you need to be successful, covering:
- PAM definitions and specific security and compliance drivers
- Core features: Password vault, session manager, application credential manager and fine-grained privilege control
- The PAM market landscape and major vendors such as BeyondTrust, CA, CyberArk, Dell, Lieberman Software and Exceedium
- How to integrate PAM with identity management, service ticketing and security monitoring systems
- Avoiding availability, performance, issues with emergency “break glass” processes and other gotchas
Who Should Attend?
CISO’s, CIO’s, Senior VP’s, IT Security Directors and Managers, Identity Management Architects or Specialists, IT Operations Managers, Network Managers, CTO’s, Risk Managers and Audit/Compliance Officers or Staff.
Dan Blum – Principal Consultant & Managing Partner
An internationally-recognized expert in security, privacy, cloud computing and identity management. Former Golden Quill award-winning VP and Distinguished Analyst at Gartner Research. Mr. Blum has extensive consulting experience on numerous enterprise IT Security and Identity Management projects within commercial, government and higher-education organizations.
Mr. Moench is a CISSP specializing in the development of security and identity strategies, architectures and management solutions. Mr. Moench has over 30 years consulting experience with developing technology and process recommendations for minimizing risk, improving security procedures, and strengthening collaboration with partners using standards-based technologies.