Blog

Two-side of the PAM Coin & Securing all aspects of Privilege

Written by Thycotic | Nov 12, 2021 5:00:00 AM

Discover this conference that took place during the 3rd edition of Cybersecurity 20/20 on October 26 and 27, 2021.

Conference description:
With the rapid explosion of organizations embracing a new remote workforce many cyber security professionals are scrambling to redesign and implement new security controls. Many organizations are choosing to prioritize privileged identity and access management to identify areas of risk and consolidate privileged identities to reduce the attack surface. Both a Least Privilege and Zero Trust strategic approach can help your team consolidate and better manage privileged identities to reduce risk and prevent catastrophic breaches.

Join Thycotic’s Director of Knowledge Mgmt. & Training, Katie McCroskey to learn about:

• 2 sides of the PAM Coin: PASM & PEDM
• How least Privilege and Zero Trust can reduce your attack surface
• Tips for securing all aspects of privileged access in a dynamic, WFH environment

Presented by:

  • KATIE MCCROSKEY, Senior Director of Knowledge Management and Training - Thycotic