PAM Checklist – The Steps to Gaining Privileged Access Security
            
            
                                                
	We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
                                 
                Watch On-Demand
            
            
                
                
            
            
            
            
            
            
                Almost all users are now privileged users.  With 80% of breaches involving the compromise of IT and business user credentials (IDs and passwords,) you must create a plan to reduce the risks posed by “overprivileged access” users, applications, and services.  It’s vital that you have a solid strategy as you take your journey to privileged access security. 
Join Joseph Carson, Thycotic’s Chief Security Scientist and Advisory CISO, as he guides you through the steps of an easy-to-understand PAM checklist. Whether you’re starting a new PAM project or strengthening an existing Privileged Access Solution, you’ll benefit from what you learn in this webinar.
                
                
                                    Speaker
                                            
                            
                                                                     Joseph Carson
                                
                                
                                    
                                        Joseph Carson
                                    
                                    Chief Security Scientist (CSS) & Advisory CISO
                                    Thycotic
                                
                             
                                                            
                                    Joseph has worked with some of the world's largest financial services organizations, helping innovate, architect, and develop grid computing farms. He played a critical role in one of the world's largest digital transformations to the cloud that consisted of more than 360 thousand users and is also a certified foreign exchange and money markets trader. Come and learn from Joseph's lessons and experience on adopting Zero Trust and reducing the risks from cyberattacks.    
                                 
                                                      
                                    
                
                                    Sponsor
                                            
                             
                        
                                    
                
                                                            
	We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
 
                    
                    Watch On-Demand