Featuring guest speaker, Forrester Research, Inc. Vice President and Principal Analyst, Andras Cser

In this on-demand webinar, guest speaker, Forrester Research, Inc. Vice President and Principal Analyst, Andras Cser, covers:

  • Why Privileged identity management (PIM) is a cornerstone of modern IT security, and how it enables organizations to dramatically mitigate risk from both internal and external threats.
  • The evolving IT challenges that PIM can help organizations address in 2019 and beyond
  • How to dial in privileged identity policies, tactics, and solutions to condense the threat surface, while enabling end users to be productive

BeyondTrust’s Sr. Director of Product Marketing, Scott Lang, follows Andras with an overview of the capabilities and strategic vision that, in our opinion, helped BeyondTrust’s holistic privileged access management platform receive recognition as a leader in the Forrester Wave™: Privileged Identity Management, Q4 2018, as well as earn the top-ranking in the PIM Strategy category.

CPE Credit Qualification: Many of our webinars qualify as CPE credit. Please provide your (ISC)2 ID certificate number when you register for the webinar and your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.

Profile photo of Andras Cser

Andras Cser

VICE PRESIDENT, PRINCIPAL ANALYST SERVING SECURITY & RISK PROFESSIONALS

Andras serves Security & Risk Professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras covers cloud security and enterprise fraud management, which have many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately. He helps clients develop enterprise strategies for creating business value through identity management, cloud security, and fraud management.

His research focuses on strategy, cost-benefit analysis, architecture, performance and scalability of identity and access management and provisioning solutions, enterprise fraud management solutions, and role-based access control (RBAC), as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating the skill sets and core competencies of professional service providers in these spaces.