Content typesWebinar White paper Blog and article Conference Podcast Case study Video Cybersecurity 20/20 Workshop Security Conference Cybersecurity 20/20 conference Security IT Study 4.0 transformation Series Big Data Series Cloud Series IT transformation series 2018 IT Study Series Security Series Product brief IT Break
Two-side of the PAM Coin & Securing all aspects of Privilege
Discover this conference that took place during the 3rd edition of Cybersecurity 20/20 on October 26 and 27, 2021.
With the rapid explosion of organizations embracing a new remote workforce many cyber security professionals are scrambling to redesign and implement new security controls. Many organizations are choosing to prioritize privileged identity and access management to identify areas of risk and consolidate privileged identities to reduce the attack surface. Both a Least Privilege and Zero Trust strategic approach can help your team consolidate and better manage privileged identities to reduce risk and prevent catastrophic breaches.
Join Thycotic’s Director of Knowledge Mgmt. & Training, Katie McCroskey to learn about:
• 2 sides of the PAM Coin: PASM & PEDM
• How least Privilege and Zero Trust can reduce your attack surface
• Tips for securing all aspects of privileged access in a dynamic, WFH environment
- KATIE MCCROSKEY, Senior Director of Knowledge Management and Training - Thycotic