Loading Events

PAM, PAM or PAM: A Comprehensive Workshop on Securing Privileged Activity

Home » Events » PAM, PAM or PAM: A Comprehensive Workshop on Securing Privileged Activity

  • This event has passed so registration is closed.

Sponsor

Details

Date and Time

January 26, 2022 @ 1:00 pm - 2:00 pm EST

Event Category

Web Conference

Organizer

Amelia Ghidotti

Contact

Lisa O'Connell

Overview

PAM has changed a great deal over the last twenty years, evolving repeatedly to keep pace with the ever-changing security landscape. In this webinar, we’ll explore the history of PAM and examine its applicability against modern-day threats such as ransomware; you will learn about the benefits, the pitfalls, and everything in between.

Join this session to discover:
• How to achieve zero standing privilege and just-in-time defense
• How adopting a Zero Trust model can help you strength security
• What the relationship is between Netwrix and traditional PAM

Moderator

Lee Neely – Information Assurance APL, LLNL

Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a current ISSA International Board Member and former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely

See Lee Neely‘s full profile.

Speaker/s

Martin Cannard – VP of Product Strategy, Netwrix

Martin has over 30 years of experience in the privileged access management and security space. In fact, Martin led the privileged access team at BeyondTrust, taking its password management solution from unknown to a recognized leader in the industry in just 3 years. We’re delighted that both Martin and that solution are now part of the Netwrix family.

See Martin Cannard‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top