Comprehensive PAM Defending Endpoints, Third Parties, and DevSecOps (OND) (2)
About this talk
Imagine your frustration with package delivery folks walking across your lawn reaches a boiling point, so you pitch a “Keep off the Grass” sign to divert them to your walkway—but this doesn’t stop them. No matter how many signs you put up, your lawn is still the quickest way from their truck to your door.
Now picture this scenario with a security lens: you can anticipate areas of high traffic and prioritize controls, however, your “grass,” i.e. your IT estate, will always be walked on. So how do you properly secure account access and privileges from dynamic threat actors like polymorphic malware?
In this session, Brandon Traffanstedt, Senior Director at CyberArk, will walk you through how to establish comprehensive privileged access management (PAM) in your company, alongside:
• The evolution of PAM and how it exists today
• 4 strategies to enhance endpoint security and manage nomadic devices
• Common practices to improve PAM
• And much more