+1-202-802-9399 (US)
A Secure Enterprise Password Manager

Three Key Steps to Improve Your Privileged Access Management Maturity Level

With up to 80 percent of breaches due to compromised credentials according to leading analysts, more organizations than ever before are prioritizing privileged account protection. Gartner noted that Privileged Access Management be your top cyber security project for 2019 the 2nd year in a row.

But a recent survey by Thycotic found 85% of organizations fail to meet even basic PAM security maturity levels. And among those who fall short, 55% have no idea how many privileged accounts they have or where they’re located.

Hear from Thycotic’s Chief Information Security Officer Terence Jackson as he explains the 4 stages of PAM Maturity and shows how you can assess your organization’s own PAM Maturity level. He’ll provide 3 key recommendations to advance your PAM maturity, showing you how to:

  1. Take the first step in PAM Maturity basics by automating the continuous discovery of privileged accounts
  2. Establish and automate specific security policies that promote proper PAM security hygiene
  3. Achieve greater PAM maturity through critical PAM insights using technology to improve cyber security

SHARE THIS


The following two tabs change content below.
mm

Terence Jackson

With more than 17 years of public and private sector IT and Security experience, Terence is responsible for protecting the company’s information assets. In his role, he currently leads a corporate-wide information risk management program. He identifies, evaluates and reports on information security practices, controls, and risks in order to comply with regulatory requirements and to align with the risk posture of the enterprise.
mm

Terence Jackson
With more than 17 years of public and private sector IT and Security experience, Terence is responsible for protecting the company’s information assets. In his role, he currently leads a corporate-wide information risk management program. He identifies, evaluates and reports on information security practices, controls, and risks in order to comply with regulatory requirements and to align with the risk posture of the enterprise.


Watch the Webinar