InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Comprehensive PAM: Defending Endpoints, Third Parties, and DevSecOps

Presented by

Brandon Traffanstedt, Senior Director, Global Technology Office at CyberArk

About this talk

Who has access to what in your organizations? How do you consistently secure privileged access to critical systems and data? Join CyberArk’s Global Technology Office for strategies for building a Comprehensive Privileged Access Management program, including: Protecting administrators and other privileged users with risk-based credential management and session management Adopting a just-in-time, Zero Trust approach to secure privileged access for external contractors and other third party identities Implementing least privilege access for all identities, from the endpoint to the cloud Securely authenticating application accounts and managing DevOps secrets to protect machine identities To receive CPE credits, submit the viewing certificate to (ISC)2 or submit your information at www.idsalliance.org/about-us/earn-isc2-cpe-credits/.
Identity Defined Security Alliance

Identity Defined Security Alliance

9340 subscribers159 talks
Vendor-neutral talks on reducing the risk of identity-related breaches
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.
Related topics