ZONE SE7EN has announced the date for their forthcoming Privileged Access Management (PAM) Roundtable event. This exclusive live Insight Zone event, taking place on 25th May at the Town Hall Hotel in London, delivers an informative roundtable and debate, Q&A session, keynote speeches and networking opportunities designed to reach and engage with decision-makers and encouraging businesses to connect with each other.
Privileged Access Management is a key area for IT professionals worldwide with many organisations establishing super-user accounts within the IT infrastructure to allow privileged identities to be automated using pre-determined criteria, including provisioning, authentication, password management, lifecycle management, authorisation and access controls to help prevent cyber security attacks internally.
This exclusive Roundtable event will discuss managing privileged identities within the corporate framework, the benefits of super-user accounts, what aspects to consider when planning on implementing a privileged identity management solution, developing policies around the use of privileged accounts, provisioning and lifecycle management tools to handle access permissions and other aspects of Privileged Access Management (PAM). ZONE SE7EN will bring together experts in PAM and end users to educate, engage and enhance the benefits of privileged identity management software.
Supported by Dell, ZONE SE7EN are delighted to announce that Jackson Shaw will be a Roundtable panellist alongside Amar Singh, CEO and founder of the Cyber Management Alliance, and Bob Tarzey, analyst and director at research organisation Quocirca Ltd.
Amar Singh commented: “There is none other more powerful than the privileged insider who often holds the master keys to all if not most of the Crown Jewels. I am looking forward to the PAM event by ZONE SE7EN to share and learn how to best manage this age old threat.”
“The more privilege a user has, the more damage they can do to IT systems. IT administrators must be trusted with privilege, but the degree to which it is granted must be limited and its use audited; over-privileged insiders may accidentally or maliciously misuse IT systems,” says Bob Tarzey, Quocirca Ltd. “The greatest danger comes from criminals who gain privileged access to IT infrastructure, often quite easily due to poor management of default privilege settings. Be it insiders or outsiders, the result of privilege abuse will be business disruption and/or data leaks.”
For a full overview of ZONE SE7EN’s Privileged Access Management event or to register visit here.
Please contact Lisa-Marie Carter at firstname.lastname@example.org for more information on sponsorship opportunities. For more information on registering to attend, please contact Kaie Foster at email@example.com.