ISMG’s Executive Roundtables focus on specific challenges being faced by information security executives in today’s cybersecurity landscape. Moderated by one of ISMG’s Executive Editors and a guest industry expert, Roundtables give cybersecurity professionals the opportunity to discuss threats and controls with a handful of market leaders in an informal setting, from which you will emerge with new ideas and solutions you can immediately put to work to improve your own organization’s defensive posture.
Modern Privileged Access Management: How to Use Threat Analytics to Help Prevent Breaches
Protecting privileged access and preventing breaches remain urgent concerns for companies of all sizes. Attackers – external and internal – use a wide range of sophisticated methods to infiltrate vulnerable systems.
But standard security solutions cannot secure internal/privileged access effectively and have serious gaps that put your organization at risk.
Where are traditional privileged access management deployments most vulnerable? How can you secure your organization against external and internal threats without causing undue friction?
If you’re looking for new perspectives on these questions, then join Tom Field for an exclusive roundtable discussion where attendees will tackle such topics as:
- Why are traditional approaches to privileged access management so risky?
- What is the role of threat analytics in protecting privileged access and preventing breaches?
- What are the four key steps to building a PAM threat analytics solution, and where can you get support in developing this program?
Joining Tom to provide expert insight will be Steven McCullar, Advisor, Solution Strategy for CA Technologies and David Reoch, Master Security Consultant, Identity and Access Management for DXC Technology.