Identity & Access Management
Security Congress Abstract
Every enterprise has a large number of privileged accounts. Privileged accounts provide the fastest and most sensitive access to systems and data; hence, it is essential to perform secure storage and enable required controls for their use. The benefits of a successful PAM implementation can be far-reaching for any cybersecurity program. It is important to grasp the breadth of privileged accounts and their utilization in the business and IT functions. With every new paradigm, the requirements for PAM become increasingly diversified and complex. Shifts towards public cloud, SaaS and DevOps and increased use of social media platforms have introduced new challenges. This session will focus on elements of a large PAM implementation using examples from some specific use cases.