Success with Privileged Access Management - Its more than the tools

Thursday
 
28
 
November
2:40 pm
 - 
3:20 pm

Speakers

Ashley Coward

Ashley Coward

IAM & PAM SME
Modern 42

Synopsis

Privileged Access Management (PAM) has emerged as a crucial defence against threats in a rapidly evolving cyber security landscape. However, while many organisations are investing heavily in advanced PAM tools, they frequently find themselves falling short of achieving their desired security and business outcomes. So in this session, we'll be discussing all things PAM - what it is, why you should care about it, and our tried and tested recipe for a successful PAM implementation.

PAM is more than just a tool. And in fact, many of the ACSC Essential Eight PAM controls can be achieved with people and process alone - no fancy tool required. To successfully manage privileged accounts in your environment, you must focus on the development and uplift of your people and processes, alongside your technology. Our recipe for success focuses on PAM Service Design and its various components (blueprints, RACIs, journey mapping, SOPs, etc.), which are vital to supporting your personnel to adopt and run with a new PAM capability. This recipe will help you avoid many of the common pitfalls experienced during PAM implementations and set you up for success. No deflated soufflés here.

This session is for people and organisations at all stages of a PAM implementation - whether you're yet to start, in the midst of one, or trying to uplift what you already have. Come along to learn more about PAM and how you can make your PAM journey as smooth as possible.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country