+1-202-802-9399 (US)
A Secure Enterprise Password Manager

Three Key Steps to Improve Your Privileged Access Management Maturity Level

Thursday, June 13, 2019 | 11:00 AM ET | 1 CPE Credit

With up to 80 percent of breaches due to compromised credentials according to leading analysts, more organizations than ever before are prioritizing privileged account protection. Gartner noted that Privileged Access Management be your top cyber security project for 2019 the 2nd year in a row.

But a recent survey by Thycotic found 85% of organizations fail to meet even basic PAM security maturity levels. And among those who fall short, 55% have no idea how many privileged accounts they have or where they’re located.

Join Thycotic’s Chief Information Security Officer Terence Jackson as he explains the 4 stages of PAM Maturity and shows how you can assess your organization’s own PAM Maturity level. He’ll provide 3 key recommendations to advance your PAM maturity, showing you how to:

  1. Take the first step in PAM Maturity basics by automating the continuous discovery of privileged accounts
  2. Establish and automate specific security policies that promote proper PAM security hygiene
  3. Achieve greater PAM maturity through critical PAM insights using technology to improve cyber security

Each webinar registrant will receive a copy of the just-published 2019 State of PAM Maturity Report featuring results from our assessment survey, key takeaways, and recommendation along with free resources.

SHARE THIS


The following two tabs change content below.
mm

Terence Jackson

With more than 17 years of public and private sector IT and Security experience, Terence is responsible for protecting the company’s information assets. In his role, he currently leads a corporate-wide information risk management program. He identifies, evaluates and reports on information security practices, controls, and risks in order to comply with regulatory requirements and to align with the risk posture of the enterprise.
mm

Latest posts by Terence Jackson (see all)

mm

Terence Jackson
With more than 17 years of public and private sector IT and Security experience, Terence is responsible for protecting the company’s information assets. In his role, he currently leads a corporate-wide information risk management program. He identifies, evaluates and reports on information security practices, controls, and risks in order to comply with regulatory requirements and to align with the risk posture of the enterprise.

ISC-CPE Credit LogoInterested in CPE Credit for attending? Please provide your (ISC)2 ID certificate number when you register. You will then automatically see your CPE credit added to your (ISC)2 account within 4-6 weeks. Note, most Thycotic webinars qualify for 1 CPE credit.

Watch the Webinar