PAM, PAM or PAM: A Comprehensive Workshop on Securing Privileged Activity

Logo
Presented by

Martin Cannard, VP of Product Strategy at Stealthbits (now part of Netwrix)

About this talk

PAM has changed a great deal over the last twenty years, evolving repeatedly to keep pace with the ever-changing security landscape. In this webinar, we’ll explore the history of PAM and examine its applicability against modern-day threats such as ransomware; you will learn about the benefits, the pitfalls, and everything in between. Join this session to discover: • How to achieve zero standing privilege and just-in-time defense • How adopting a Zero Trust model can help you strength security • What the relationship is between Netwrix and traditional PAM
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (329)
Subscribers (33952)
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.