+1-202-802-9399 (US)
Icon - identify an application as soon as it starts with Privilege Manager for Windows

Back to the Basics: Privileged Access Management 101

With so many recent high-profile breaches accomplished through compromising passwords on privileged accounts, Privileged Access Management is now everyone’s priority (Gartner puts it at the top of the list for 2018). But where do you start? And how do you know which PAM solution will work best to protect your organization without sacrificing productivity?

Join Chief Security Scientist Joseph Carson on a brief journey through the Privileged Account Management lifecycle to get you quickly up to speed on:

  • Best practices for evaluating your current PAM practices and where to start
  • How to automatically discover and manage credentials across your network
  • How to demonstrate regulatory compliance with automated reporting

The following two tabs change content below.

Joseph Carson

Joseph Carson has over 25 years' experience in enterprise security, is the author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies", and is a cyber security professional and ethical hacker. Joseph is a cyber security advisor to several governments, critical infrastructure, financial and transportation industries, speaking at conferences globally. Joseph serves as the Chief Security Scientist at Thycotic.

Latest posts by Joseph Carson (see all)

Joseph Carson
Joseph Carson has over 25 years' experience in enterprise security, is the author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies", and is a cyber security professional and ethical hacker. Joseph is a cyber security advisor to several governments, critical infrastructure, financial and transportation industries, speaking at conferences globally. Joseph serves as the Chief Security Scientist at Thycotic.


Watch the Webinar


 

SHARE THIS