Nearly every breach involves privilege elevation. To address this problem, most companies will buy a Privileged Access Management (PAM) solution, which let them manage, monitor, and protect powerful privileged user accounts within the IT infrastructure of an enterprise.
However, many of these PAM solutions stay on the shelf or are woefully under deployed against the vast number of privileged accounts present in an organization. In this 45-minute session, Lance Peterman, Identity and Access Management Architect at Merck, will provide a core understanding of what a PAM program should contain and tips on how to avoid common pitfalls that keep a PAM program from reaching its potential.
Latest posts by Jeff Edwards (see all)