Harnessing Privileged Access Management (PAM) to Defend Core Digital Assets Against a Breach

How do you manage the risk of privileged accounts being compromised, breaching your organization? PAM can reduce risks by hardening your environment in ways no other solution can, but is challenging to deploy. This webinar provides an unbiased perspective on PAM capabilities, lessons learned and deployment challenges, distilling the good practices you need to be successful:

  • PAM definitions, core features and specific security and compliance drivers
  • The PAM market landscape and major vendors
  • How to integrate PAM with identity management, service ticketing and  monitoring
  • Avoiding availability and performance issues



pam recording 

Regaining the Defensive Advantage (May 21, 2015)

In military doctrine from Sun Tzu to Clausewitz, defenders had the advantage over attackers. But in the cyberspace realm, we’ve lost our edge.  What can we do? As security breaches proliferate, this question become critical. This webinar covers how organizations can: 

  • Prevent large-scale breaches to core IT environments
  • Slow down attackers using innovative but practical techniques
  • Improve situational awareness and rapid response capabilities




Security Governance For Higher Education (April 9, 2015)

Cyberattacks on higher education institutions are increasing and succeeding. On this webinar, Principal Consultant Dan Blum and Dr. Tom Johnson (Webster University) discuss governance and protection issues for institutions and recommend a series of actionable steps – including but not limited to governance improvement – to correct this situation. 

security governance for higher education

Security Governance 101: Choosing Models and Structures (February 11, 2015)

Even on technical consulting engagements, Security Architects Partners often finds that a security governance issue is at the root of the problem we were brought in to solve. Therefore, we’ve developed a set of models and principles to help  organizations determine what should be shared, or centralized, what should be de-centralized and how to set up and operate matrix models.

                                    webinar recording1



           watch this space