All Access is Privileged – Taking a PAM-First Approach Towards your Identity Security Program
Sponsored by
An acknowledged expert in Identity Access Management. He has been an identity and security specialist for most of his career, working with companies like Novell/OpenText, Saviynt, Legion Star. Over the course of his career, Nabeel has helped numerous Fortune 500 companies develop Identity and Security strategies, enabling best practice information security processes at the speed of business. After a successful tenure in the world of enterprise software, Nabeel now brings his knowledge and expertise of IAM, Cloud and Application Security to MajorKey.
All Access is Privileged – Taking a PAM-First Approach Towards your Identity Security Program
Thursday, July 11 I 2PM ET
The concept of privileged access used to pertain to Windows Server Admins and Linux Root user access – but in today’s business landscape, privileged access has extended to include sensitive & critical access to applications, on-premise and in the cloud. Marketing users have access to sensitive CRM and client data. HR users have access to private health and financial information. The idea that only high-level admins are privileged is outdated – all access is privileged.
Privileged Access Management is evolving and must be at the foundation of your identity security program. PAM must be viewed more than a tool, but as the driver of modern identity programs. Let’s discuss how to grow beyond compliance and bring security to the forefront.
What you’ll learn:
- Which business assets need to be protected
- The risks associated with your assets being attacked
- How to begin protecting assets within your enterprise
- Who, internally, should own privileged access
- Best practices for operating a holistic PAM program - and where to begin
- The role of ITDR with PAM