-
Subjects
-
Content types
Webinar
White paper
Blog and article
Conference
Podcast
Case study
Video
Cybersecurity 20/20 Workshop Security
Conference Cybersecurity 20/20 conference Security
IT Study
4.0 transformation Series
Big Data Series
Cloud Series
IT transformation series
2018 IT Study Series
Security Series
Product brief
IT Break
-
Partners
Two-side of the PAM Coin & Securing all aspects of Privilege
Discover this conference that took place during the 3rd edition of Cybersecurity 20/20 on October 26 and 27, 2021.
Conference description:
With the rapid explosion of organizations embracing a new remote workforce many cyber security professionals are scrambling to redesign and implement new security controls. Many organizations are choosing to prioritize privileged identity and access management to identify areas of risk and consolidate privileged identities to reduce the attack surface. Both a Least Privilege and Zero Trust strategic approach can help your team consolidate and better manage privileged identities to reduce risk and prevent catastrophic breaches.
Join Thycotic’s Director of Knowledge Mgmt. & Training, Katie McCroskey to learn about:
• 2 sides of the PAM Coin: PASM & PEDM
• How least Privilege and Zero Trust can reduce your attack surface
• Tips for securing all aspects of privileged access in a dynamic, WFH environment
Presented by:
- KATIE MCCROSKEY, Senior Director of Knowledge Management and Training - Thycotic