Discover this conference that took place during the 3rd edition of Cybersecurity 20/20 on October 26 and 27, 2021.
With the rapid explosion of organizations embracing a new remote workforce many cyber security professionals are scrambling to redesign and implement new security controls. Many organizations are choosing to prioritize privileged identity and access management to identify areas of risk and consolidate privileged identities to reduce the attack surface. Both a Least Privilege and Zero Trust strategic approach can help your team consolidate and better manage privileged identities to reduce risk and prevent catastrophic breaches.
Join Thycotic’s Director of Knowledge Mgmt. & Training, Katie McCroskey to learn about:
• 2 sides of the PAM Coin: PASM & PEDM
• How least Privilege and Zero Trust can reduce your attack surface
• Tips for securing all aspects of privileged access in a dynamic, WFH environment
- KATIE MCCROSKEY, Senior Director of Knowledge Management and Training - Thycotic