Privilege Access Management Maturity Showcase with Delinea
Reduce risk associated with privileged accounts, enhance business agility, & boost efficiency.
- Available to Watch on Demand
- Virtual, GoToWebinar
- Please complete a GoToWebinar System Check to ensure device compatibility
Implementing PAM: Reducing Risk and Ensuring Compliance
Implementing Privileged Access Management (PAM) helps organisations reduce the risk of internal and external threats, ensures compliance with regulatory requirements, and provides greater visibility and control over critical IT resources. PAM focuses on managing and protecting privileged accounts within an organisation's IT environment. These accounts typically have elevated permissions, allowing them to perform critical functions like configuring systems, installing software, and accessing sensitive data. Due to their extensive capabilities, these accounts are prime targets for cyber attackers, making effective PAM crucial for mitigating security risks.
Webinar with Mark Lillywhite and Ewan Brown
Join our webinar with Somerford's Ewan Brown, who has over 20 years of experience in designing secure PAM solutions across various industries, and Delinea's Mark Lillywhite, a Cyber Security industry veteran with expertise in endpoint, identity, and Privileged Access best practices. Ewan and Mark will discuss the PAM Maturity Curve, guiding organisations from zero maturity to advanced stages. As organisations progress through the maturity curve, they expand their protection to include more privileged users, sensitive systems, and critical accounts.
Agenda
- Governance, Risk, and Compliance (GRC) – Assessing the integrity of your systems and ensuring visibility and oversight.
- Privilege Administration – Creating, defining, and managing privileges across your organisation.
- Identity and Access Management – Strengthening authorisation and implementing granular access controls.
- User Adoption – Managing privileged user interactions with PAM through practical strategies for a smoother experience.
- 3rd Parties (Supply Chain) – Protecting your security from external partners without sacrificing productivity.
- Cloud (Public & SaaS) – Best practices for managing identity and privileged access in cloud environments to prevent vulnerabilities.