Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand


Two Sides of the PAM Coin

Watch the Webinar


There are two sides of the PAM Coin. Password vaulting is one. Privilege Elevation is the other. 

A vault is a great first step in protecting your company from identity-related data breaches. When considering a mature Privileged Access Management (PAM) solution, and for best practices like Zero Trust and Zero Standing Privileges, you need a vault, and you need privilege elevation. You need both sides of the PAM coin.   

How do you effectively control administrator activity and access with privilege elevation? Are you enforcing strong authentication and identity assurance with Multi-Factor Authentication (MFA) for all privileged access? Cloud providers offer some basic IAM capabilities, but without unified management of access to other platforms, are you leaving gaps in security and increasing the likelihood of breaches? 

In this webinar, Tony Goulding and Brad Shewmake will walk us through these important concepts and considerations for PAM maturity to secure the modern enterprise.   

Who should watch this webinar? 

  • IT Security
  • CISOs and Executive Leadership 
  • IT operations: Systems Administrators, Helpdesk Teams, Infrastructure Management, Workstation Management, etc. 
  • Professionals looking to move into these roles 

What will I learn?

  • What the two sides of the PAM coin are and why you should be using both for effective privileged access security.
  • Insights on how to effectively reduce your attack surface.
  • How least privilege and just-in-time access benefits elastic, agile environments.

Get answers to these important questions: 

  • Why is it essential to assess your enterprise’s PAM maturity and implement the Zero Trust model in your security framework?
  • How should organizations approach and evolve PAM maturity?


Tony Goulding

Tony Goulding

  • Tony Goulding is a cyber security evangelist at ThycoticCentrify
  • He contributes to product strategy, messaging, competitive intelligence, sales enablement, and go-to-market strategy
  • Educated in the U.K. with a BSc. Honors degree in Mathematics, Tony has been part of the global IT security community for more than 30 years
  • He is an IT security expert and author, speaking at industry events internationally, and regularly provides commentary and publishes articles on data breaches, insider threats, cyber warfare, incident response, and IT security best practices
  • Tony is ITIL and CISSP certified
Brad Shewmake

Brad Shewmake

  • Brad Shewmake is Director of Corporate Communications at ThycoticCentrify.
  • He communicates the company's vision, leadership, and news with global media, industry analysts, and customers across multiple channels, with a focus on insightful thought leadership and increasing awareness about the top cyber security threats facing organizations
  • He has held similar roles over 20 years with global leaders, including BMC Software, Good Technology (now Blackberry), Kyocera Corp., and Nokia, in addition to working with innovative clients as a consultant and at world-class PR agencies