(ISC)² Security Briefings Part 3: Step 2: Protect from Within - Requirements for PAM
Identity is the new perimeter for Security in the digital enterprise. According to Forrester, 80% of security breaches involve the use or abuse of privileged credentials. At the same time, compliance mandates (such as PCI) require organizations to focus on how they manage and control privileged users in order to protect these critical resources. Privileged Access Management (PAM) provides a host of capabilities that enable organizations to address these critical challenges. Join CA Technologies and (ISC)² on November 3, 2016 at 1:00PM Eastern for a webcast that will highlight emerging requirements in privileged access management, and present key capabilities that are important in a comprehensive PAM solution.
Save my Spot!
Thursday, November 3, 2016 1:00 PM - 2:00 PMEastern Time Zone