Privilege Access Management Maturity Showcase with Delinea
Reduce risk associated with privileged accounts, enhance business agility, & boost efficiency.
- Thursday, 7th November
- 🇬🇧 2:00 PM - 2:30 PM GMT | 🇦🇪 6:00 PM - 6:30 PM GST
- Virtual, Microsoft Teams
- Microsoft Teams hardware requirements for desktop and web apps
Implementing PAM: Reducing Risk and Ensuring Compliance
Implementing PAM helps organisations reduce the risk of internal and external threats, ensures compliance with regulatory requirements, and provides greater visibility and control over critical IT resources.
PAM focuses on managing and protecting privileged accounts and their access within an organisation's IT environment. These privileged accounts typically have elevated permissions that allow them to perform critical functions, such as configuring systems, installing software, or accessing sensitive data. Given their extensive capabilities, these accounts are highly attractive targets for cyber attackers, making effective PAM crucial for mitigating security risks.
Webinar with Mark Lillywhite and Ewan Brown
Join our webinar with Somerford's Ewan Brown, who has over 20 years of experience in designing secure PAM solutions across all industry verticals in many large organisations, and Delinea's Mark Lillywhite – a veteran of the Cyber Security industry with extensive experience of endpoint, identity and Privileged Access best practice. Ewan & Mark will discuss the PAM Maturity curve, taking an organisation from Zero maturity through basic, intermediate and onto advanced. As an organisation progresses through the phases of the maturity curve, organisations expand their protection to include more types of privileged users, sensitive systems, and their privileged accounts.
Agenda
- Governance, Risk, and Compliance (GRC) – How strong is the integrity of your system, and how much visibility and oversight do you have?
- Privilege Administration – How do you create, define, and manage privileges across your organisation?
- Identity and Access Management – How strong are your authorisation controls, and how granular are your access controls?
- User Adoption – PAM will ask your privileged users to take extra steps – do you use the carrot or the stick? Learn how simple steps can really smooth their experience.
- 3rd Parties (AKA Supply chain) – Numerous recent breaches involve organisations outside of your control – learn simple steps to protect your security, without sacrificing productivity.
- Cloud (Public & SaaS) – Cloud changes everything from an Identity and Privileged Access perspective. Learn best practices to ensure your cloud estate doesn’t become a thunderstorm!