PAM, PAM or PAM: A Comprehensive Workshop on Securing Privileged Activity

Logo
Presented by

Martin Cannard, VP of Product Strategy at Stealthbits (now part of Netwrix)

About this talk

PAM has changed a great deal over the last twenty years, evolving repeatedly to keep pace with the ever-changing security landscape. In this webinar, we’ll explore the history of PAM and examine its applicability against modern-day threats such as ransomware; you will learn about the benefits, the pitfalls, and everything in between. Join this session to discover: • How to achieve zero standing privilege and just-in-time defense • How adopting a Zero Trust model can help you strength security • What the relationship is between Netwrix and traditional PAM

Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (242)
Subscribers (25773)
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.