Since privileged access is usually the last link in the cyber kill chain, Privileged Access Management (PAM) has evolved in importance from simple password management to an essential cyber risk reduction imperative.
Now is the time to redefine what it means to have a mature PAM program in today’s multi-cloud world. Nearly half of all data breaches happen in the cloud and 92% of organizations are currently hosting at least some of their IT environment in the cloud. That means the majority of all businesses today have experienced a breach and continue to be at risk.
Join Saviynt for a conversation on what’s “in” and what’s “out” in a modern, cloud privileged access management program:
- Out: user friction, overprovisioning, and rubber-stamping
- In: agile processes, zero-standing privilege (ZSP), and risk-based decision making
Topics and Takeaways:
- Gaps in traditional PAM tools and approaches
- Why a modern program must include just-in-time (JIT) PAM
- Quick wins on the road to JIT PAM and ZSP
- How Identity Governance and Privileged Access Management are converging to reduce risks and enhance productivity
Event Speakers
Chris is a Director of Product Management at Saviynt where he drives product innovation, execution of the technology roadmap, and go-to-market strategies. He has more than 15 years of experience in the identity access management and privileged access management industry. Before Saviynt, Chris held various technical and leadership roles at Quest / One Identity, CyberArk, BeyondTrust, and Centrify.
Tom Spring is Editorial Director for SC Media and is based in Boston, MA. For two decades he has worked at national publications in the leadership roles of publisher at Threatpost, executive news editor PCWorld/Macworld and technical editor at CRN. He is a seasoned cybersecurity reporter, editor and storyteller that aims always for truth and clarity.