Depending on your flavor of Privileged Access Management (PAM) solution, you may be using basing much of your organization’s security on little more than a feature-rich password vault that includes mechanisms to restrict access to and use of privileged accounts.
But at the core of PAM solutions is the definition of “privileged” – most organizations are left to determine for themselves what exactly that term means and, therefore, which accounts should fall subject to a PAM solution. In addition, the methodology of utilizing user accounts with standing privilege in and of itself introduces risk to the organization, requiring that a PAM solution be in place.
In this Real Training for Free session, we’re going to take a look at the concept of Privileged Access Security (PAS) – a security methodology that seeks to leverage just-in-time privileged access rather than standing accounts.
Up first, 4-time Microsoft MVP Nick Cavalancia takes my seat as he first takes a look at the current problems with managing privileged accounts, the risk they create, how PAM seeks to address it, and where the gaps exist in the methodology.
Up next, we’ll hear from Ron Rasin, Chief Strategy Officer at Silverfort, and Kev Smith, Principal Engineer at Silverfort. Ron and Kev will discuss the inherent blind spots in traditional PAM solutions and dive into the fundamentals of privileged access security (PAS), interactively exploring key strategies for discovering, classifying, and securing privileged accounts across various organizational tiers.
Topics will include:
- How to gain complete visibility into all your privileged accounts which empowers you to reduce the attack surface
- How to monitor all privileged user’s activity and permissions
- How to implement and enforce least privilege and Just-in-Time (JIT) policies
- How to align PAS best practices with your organizational needs
This Real Training for Free session will be loaded with practical real-world application to your cybersecurity strategy and execution.