Hi [[ session.user.profile.firstName ]]

Avoid failure and disappointment: essential items for your PAM Checklist

It’s a critical foundation for your security strategy. It addresses security elements involved in over 80% of security breaches. And it’s consistently identified by analysts as essential for organisations’ security. So why do Privileged Access Management (PAM) projects so often end in disappointment and failure?

In this webinar we consider factors that go beyond technology, planning and execution and act as a checklist for effective PAM projects. With over 25 years involvement in successful PAM, Identity Management and cybersecurity projects, Osirium Customer Services Director Barry Scott shares insights and learnings to help avoid common pitfalls and deliver results.

Join us for this webinar where Barry will consider factors including:
- Factors that have given PAM a lousy reputation at times
- Defining key drivers
- Aligning project scope with stakeholder buy-in
- SysAdmin practice changes
- Looking to the positives
Recorded Jun 11 2020 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Barry Scott, Customer Services Director
Presentation preview: Avoid failure and disappointment: essential items for your PAM Checklist

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • PAM Lockdown Learning: remote access isn’t the remote access of old Recorded: Jul 28 2020 44 mins
    Andy Harris, CTO, Osirium
    Currently enforced changes in working practices require a change in how we view security for our most valuable assets. In this webinar we explore the implications. Why today’s privileged access strategy needs to be about much more than passwords, vaults and policies. How IT infrastructure staff have become the ""Unsung heroes"" of this pandemic. How new rules are being built on a daily basis.

    In particular we investigate the challenges and implications of secure remote access
    • Access patterns have changed, making it harder to tell what might be suspicious
    • The old rules went very quickly. The new rules will stay longer than Covid 19
    • How do we ensure secure remote access for a much expanded network of external suppliers
    • For a growing workforce based at home, how we balance productivity with security

    Please join us for this webinar to explore these and other points essential for securing the new infrastructure.
  • How to safely automate three key IT Operations tasks that rarely are. Recorded: Jul 16 2020 32 mins
    Mark Warren, Product Marketing, Osirium
    It's a given: IT teams are over-worked. But what if they could automate those jobs that normally need IT experts? What if they could be delegated to first-line help desk agents or even provided to users for self-service?

    Until now, that's not been practical. Automation, using tools like RPA, is hard to build and operate reliably, it takes a lot of infrastructure and depends on specialist automation engineers.

    In this webinar, you'll see how automation can be applied to a range of IT and business operations to safely delegate tasks and free resources to work on business initiatives.

    Imagine if you could automate your work, what would you rather be doing?

    What you will learn:

    - The importance of automation to accelerating IT operations
    - Examples of immediate benefits of automation with PPA
    - Recommendations for getting started with automating IT and business operations
  • Privileged Access today: how to worry the right amount about real risks Recorded: Jun 25 2020 30 mins
    Chris Heslop, Osirium
    Osirium is a leading European provider of Privileged Access Security solutions with a focus on delivering comprehensive security that is flexible and simple to deploy. In this webinar we’ll be looking at recent trends and exploring how rapidly evolving operational practices affect security, and pinpointing where real security risks lie. We’ll consider how remote working and remote collaboration depend on secure third party access. Now that people are no longer working primarily in controlled office environments, we’ll investigate the security implications of passwords and privileged credentials entered remotely. In addition we’ll consider factors such as process automation and how to balance the two apparently conflicting drivers of productivity and security.
  • Avoid failure and disappointment: essential items for your PAM Checklist Recorded: Jun 11 2020 27 mins
    Barry Scott, Customer Services Director
    It’s a critical foundation for your security strategy. It addresses security elements involved in over 80% of security breaches. And it’s consistently identified by analysts as essential for organisations’ security. So why do Privileged Access Management (PAM) projects so often end in disappointment and failure?

    In this webinar we consider factors that go beyond technology, planning and execution and act as a checklist for effective PAM projects. With over 25 years involvement in successful PAM, Identity Management and cybersecurity projects, Osirium Customer Services Director Barry Scott shares insights and learnings to help avoid common pitfalls and deliver results.

    Join us for this webinar where Barry will consider factors including:
    - Factors that have given PAM a lousy reputation at times
    - Defining key drivers
    - Aligning project scope with stakeholder buy-in
    - SysAdmin practice changes
    - Looking to the positives
  • PAM Lockdown Learning: remote access isn’t the remote access of old Recorded: May 28 2020 45 mins
    Andy Harris, CTO, Osirium
    Currently enforced changes in working practices require a change in how we view security for our most valuable assets. In this webinar we explore the implications. Why today’s privileged access strategy needs to be about much more than passwords, vaults and policies. How IT infrastructure staff have become the ""Unsung heroes"" of this pandemic. How new rules are being built on a daily basis.

    In particular we investigate the challenges and implications of secure remote access
    • Access patterns have changed, making it harder to tell what might be suspicious
    • The old rules went very quickly. The new rules will stay longer than Covid 19
    • How do we ensure secure remote access for a much expanded network of external suppliers
    • For a growing workforce based at home, how we balance productivity with security

    Please join us for this webinar to explore these and other points essential for securing the new infrastructure.
  • Privileged Access Management (PAM) for the NHS and Essential Services Recorded: May 21 2020 51 mins
    Mark Warren, Product Marketing, Osirium Alex Cowan, Co-founder & CEO, RazorSecure Tom Hills, Sales Engineer, Osirium
    If you're involved in cybersecurity for the NHS or any other essential service such as transportation or utility providers affected by the Network and Information Systems (NIS) Directive, you’ll know that preparation, protection, and resilience have to be priorities.

    This webinar will provide actionable insights and recommendations to improve your cybersecurity projects with a focus on the Cyber Assessment Framework (CAF) principles for privileged account management.

    The agenda includes actionable insights on how to:

    1. Assess your current position
    2. Define a plan for becoming compliant
    3. How to achieve and maintain compliance while improving productivity and service levels. This free, live webinar will provide actionable insights and recommendations to improve your cybersecurity projects with a focus on the Cyber Assessment Framework (CAF) principles for privileged account management.
  • Protecting vital IT assets with Privileged Access Management Recorded: May 7 2020 3 mins
    Osirium
    Protecting vital IT assets with Privileged Access Management
Innovators in Privileged Access Security
Osirium is a leading innovator of Privileged Access Security (PAS) solutions to protect IT infrastructure and endpoints, and securely streamline IT to deliver digital transformation.

Osirium's PAS solution builds on and extends beyond traditional Privileged Access Management (PAM). PAS includes Privileged Process Automation (PPA) to automate privileged tasks for streamlined and secure IT operations. Privileged Endpoint Management (PEM) to remove local administrator accounts and manage applications approved to run with elevated privileges.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Avoid failure and disappointment: essential items for your PAM Checklist
  • Live at: Jun 11 2020 12:00 pm
  • Presented by: Barry Scott, Customer Services Director
  • From:
Your email has been sent.
or close