PAM Checklist – The Steps to Gaining Privileged Access Security
We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Watch On-Demand
Almost all users are now privileged users. With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords,) you must create a plan to reduce the risks posed by “overprivileged access” users, applications, and services. It’s vital that you have a solid strategy as you take your journey to privileged access security.
Join Joseph Carson, Thycotic’s Chief Security Scientist and Advisory CISO, as he guides you through the steps of an easy-to-understand PAM checklist. Whether you’re starting a new PAM project or strengthening an existing Privileged Access Solution, you’ll benefit from what you learn in this webinar.
Speaker
Joseph Carson
Chief Security Scientist (CSS) & Advisory CISO
Thycotic
Joseph has worked with some of the world's largest financial services organizations, helping innovate, architect, and develop grid computing farms. He played a critical role in one of the world's largest digital transformations to the cloud that consisted of more than 360 thousand users and is also a certified foreign exchange and money markets trader. Come and learn from Joseph's lessons and experience on adopting Zero Trust and reducing the risks from cyberattacks.
Sponsor
We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Watch On-Demand