Tony Goulding

Cyber Security Evangelist ThycoticCentrify

Tony is a cyber security evangelist at ThycoticCentrify, helping deliver cloud identity security solutions to secure modern enterprises and stop the leading cause of breaches — privileged access abuse. Internally he’s a Senior Director in Technical Product Marketing, involved with product positioning and messaging, analyst relations, market intelligence, sales enablement, content creation, go-to-market strategy, and thought leadership. He is an IT security expert and author, speaking at industry events internationally. Educated in the United Kingdom with a BSc. Honors degree in Mathematics, Tony has been part of the global IT security community for more than 25 years. His domain expertise lies in identity and access management and privileged access security. He regularly provides commentary, publishing blogs, articles, and bylines on data breaches, insider threats, cyber warfare, incident response, and IT security best practices. He is ITIL and CISSP certified.

Agenda Day 2: 27th October 2021

1:00 PM Two Sides of the PAM Coin

There are two sides of the PAM coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches. When considering a mature Privileged Access Management (PAM) solution, and for best practices like Zero Trust and Zero Standing Privileges, you need a vault, and you need privilege elevation. You need both sides of the PAM coin.

How do you effectively control administrator activity and access with privilege elevation? Are you enforcing strong authentication and identity assurance with Multi-Factor Authentication (MFA) for all privileged access? Cloud providers offer some basic IAM capabilities, but without unified management of access to other platforms, are you leaving gaps in security and increasing the likelihood of breaches?

In this interactive session, Tony Goulding will walk us through these important concepts and considerations for PAM maturity to secure the modern enterprise.

  • What the two sides of the PAM coin are and why you should be using both for effective privileged access security.
  • Insights on how to effectively reduce your attack surface.
  • How least privilege and just-in-time access benefits elastic, agile environments.
  • How should organisations approach and evolve PAM maturity?