Speakers
Synopsis
Privileged Access Management (PAM) has emerged as a crucial defence against threats in a rapidly evolving cyber security landscape. However, while many organisations are investing heavily in advanced PAM tools, they frequently find themselves falling short of achieving their desired security and business outcomes. So in this session, we'll be discussing all things PAM - what it is, why you should care about it, and our tried and tested recipe for a successful PAM implementation.
PAM is more than just a tool. And in fact, many of the ACSC Essential Eight PAM controls can be achieved with people and process alone - no fancy tool required. To successfully manage privileged accounts in your environment, you must focus on the development and uplift of your people and processes, alongside your technology. Our recipe for success focuses on PAM Service Design and its various components (blueprints, RACIs, journey mapping, SOPs, etc.), which are vital to supporting your personnel to adopt and run with a new PAM capability. This recipe will help you avoid many of the common pitfalls experienced during PAM implementations and set you up for success. No deflated soufflés here.
This session is for people and organisations at all stages of a PAM implementation - whether you're yet to start, in the midst of one, or trying to uplift what you already have. Come along to learn more about PAM and how you can make your PAM journey as smooth as possible.