Key Takeaways:
- What high-assurance privileged access looks like across distributed architectures
- Why traditional vault-centric PAM tools fall short when admin access is ephemeral, API-driven or embedded in automated pipelines
- Strategies for maintaining least-privilege enforcement when the perimeter is gone, and identities are scattered across dozens of platforms
- What good privileged access monitoring looks like in practice: moving beyond session recording to genuine behavioural risk detection
Check out the incredible speaker line-up to see who will be joining Reid.
Download The Latest Agenda