CA Briefings Part 3: Step 2: Protect from Within - Requirements for PAM

Presented by

John Hawley, VP of Security Strategy & Trevor Brown, Project Manager, CA Technologies and Brandon Dunlap, Moderator

About this talk

Identity is the new perimeter for Security in the digital enterprise. According to Forrester, 80% of security breaches involve the use or abuse of privileged credentials. At the same time, compliance mandates (such as PCI) require organizations to focus on how they manage and control privileged users in order to protect these critical resources. Privileged Access Management (PAM) provides a host of capabilities that enable organizations to address these critical challenges. Join CA Technologies and (ISC)2 on November 3, 2016 at 1:00PM Eastern as we continue examining the steps for strengthening your enterprise and increasing customer engagement highlighting emerging requirements in privileged access management and present key capabilities that are important in a comprehensive PAM solution.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (77)
Subscribers (18738)
This channel covers Symantec Privileged Access Management, Symantec Authentication, Symantec Identity Management, and Symantec SiteMinder. We will focus on topics including identity, privileged users, access management and other top cybersecurity trends in the industry.