RSAC ’17: Unsticking Your Privileged Access Management Program

Nearly every breach involves privilege elevation. To address this problem, most companies will buy a Privileged Access Management (PAM) solution,  which let them manage, monitor, and protect powerful privileged user accounts within the IT infrastructure of an enterprise.

However, many of these PAM solutions stay on the shelf or are woefully under deployed against the vast number of privileged accounts present in an organization. In this 45-minute session, Lance Peterman, Identity and Access Management Architect at Merck, will provide a core understanding of what a PAM program should contain and tips on how to avoid common pitfalls that keep a PAM program from reaching its potential.

Follow Jeff

Jeff Edwards

Editor, Cybersecurity at Solutions Review
Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
Jeff Edwards
Follow Jeff