Privileged Access Management—Unsticking Your PAM Program


Posted on in Presentations

Nearly every breach involves privilege elevation. Most companies will buy a PAM tool to address a portion of this capability. How many stay on the shelf or are woefully under deployed vs. the number of privileged accounts? This session will provide a core understanding of what a PAM program should contain and tips on how to avoid the pitfalls that keep a PAM program from reaching its potential.

Participants
Lance Peterman

Security Architect, Merck

Identity

authentication identity management & governance password management security operations access control


Topic

Subtopic


Share With Your Community