Security reports routinely highlight credential misuse as the number one cause of breaches. However, zeroing in closer on the kill chain steps, we will almost always find a privileged access and/or credential management failure that paved the way for the breach.

Therein lies an opportunity for businesses to bolster layered defense through privileged account management (PAM). Once a challenging program to undertake, today’s leading solutions make PAM considerably easier and achievable. While PAM solutions have lagged in their move to the cloud—that is now changing, with PAM-deployed solutions increasingly reaching feature-parity with on-premise solutions.

In this on-demand webinar, cybersecurity strategist Dan Blum will discuss cloud PAM capabilities such as:

Photograph of Dan Blum

Dan Blum, Cybersecurity Strategist and Author

Dan Blum is an internationally recognized strategist in cybersecurity and risk management. He was a Golden Quill Award winning VP and Distinguished Analyst at Gartner, Inc., has served as the security leader for several startups and consulting companies, and has advised 100s of large corporations, universities and government organizations. He consults with clients on identity management, PAM, risk management, and other topics. He's made his new book Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment freely available for Open Access via Apress, or on Amazon.

Photograph of Tal Guest

Tal Guest, Senior Director of Product Management

Tal Guest is a Director of Product Management with over 20 years of industry experience. He directs a group of product managers, responsible for expanding privileged access management core capabilities in the areas of remote access and the service desk. Tal also helps establish long-term business strategies based on current/future market conditions and problems faced in the privileged access management area of cybersecurity.

Prefers reduced motion setting detected. Animations will now be reduced as a result.