CA Briefings Part 3: Step 2: Protect from Within - Requirements for PAM

Logo
Presented by

John Hawley, VP of Security Strategy & Trevor Brown, Project Manager, CA Technologies and Brandon Dunlap, Moderator

About this talk

Identity is the new perimeter for Security in the digital enterprise. According to Forrester, 80% of security breaches involve the use or abuse of privileged credentials. At the same time, compliance mandates (such as PCI) require organizations to focus on how they manage and control privileged users in order to protect these critical resources. Privileged Access Management (PAM) provides a host of capabilities that enable organizations to address these critical challenges. Join CA Technologies and (ISC)2 on November 3, 2016 at 1:00PM Eastern as we continue examining the steps for strengthening your enterprise and increasing customer engagement highlighting emerging requirements in privileged access management and present key capabilities that are important in a comprehensive PAM solution.

Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (383)
Subscribers (91348)
(ISC)² Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.