Privileged Access Management
Category

Privileged Access Management

How do you successfully manage your privileged users without "giving away the keys to the kingdom", but still allowing your organization's gatekeepers to properly manage the network? Our industry experts will share their models for walking the tightrope of control.

Privileged Access Management (PAM)

Credential Theft as a Primary Attack Vector - Detect and Respond to Privileged and Service Account Attacks

Barak Feldman - CyberArk  •   • 

Start this Session

Privileged Access Management and Secure Code: Gaining an Inside and Outside View of Applications

Alex Mosher - CA Technologies  •   • 

Start this Session

Privileged Access Management & Secure Code: Gaining an Inside and Outside View of Applications

Alex Mosher - CA Technologies  •   • 

Start this Session

Avoid Theft of Your Privileged Credentials

Archived Session  • 

Doug Gourlay - Skyport Systems  •   • 

Start this Session

Session Contributors

Alex Mosher

Vice President of Security Strategy, CA Technologies

Read Bio
Andy Givens

Regional Director, Engineering, CyberArk

Read Bio
Barak Feldman

SVP, PAM and Identity Security, Cyberark

Read Bio
Doug Gourlay

Executive Vice President, Skyport Systems

Read Bio
Ian Yip

Chief Technology Officer - Asia Pacific, McAfee; former Director of Cybersecurity, Ernst & Young

Read Bio
Joseph Carson

Chief Security Scientist, Thycotic

Read Bio
Martin Cannard

Vice President of Product Strategy for Stealthbits, Netwrix

Read Bio
Mustafa Rassiwala

Sr. Director of Products, Lastline

Read Bio
Paul Turner

CTO for Products, Venafi

Read Bio
Sam Elliott

Director of Security Product Management, Bomgar

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.