The PAM (R)evolution: How to stay secure, productive, and compliant
Register now!Thank You!!
Identities are evolving. So is Privileged Access Management.
Traditional Privileged Access Management (PAM) was established to protect privileged IT accounts like domain admins, but the attack surface now includes a constantly evolving universe of business users, machine identities, and service accounts.
To meet the challenge, PAM has evolved to become the heart of an integrated identity security strategy.
Organizations are saving time and eliminating siloes by moving to a common platform with centralized credentials management, consistent policies, and all identity security capabilities in one place.
Don't miss this opportunity to join the conversation to get the latest details as you evaluate your current security strategy, build your 2025 budget, and plan for the future.
What will I learn?
- How PAM evolved into what it is today.
- How to reduce the impact of change on your budget.
- Insights into why cyber insurers are so focused on identity security and authorization controls.
Get answers to these important questions:
- How do I know if my current PAM strategy is enough?
- How can I help my team/colleagues be more efficient while I add more security controls?
- Why is an enterprise-grade vault so important?
MEET THE PRESENTERS
Frank is Chief Security Scientist at Delinea. He has over three decades of experience as an auditor and security professional, along with corporate IT executive management. Frank holds Certified Internal Auditor (CIA) and Certified Information System Auditor (CISA) designations, and passed the CISSP exam in 2001. He is a frequent speaker at audit (IIA), IT audit (ISACA), software publishers, security, and user group events.