EP 33 - The Evolution of Privileged Access Management (PAM)
Aug 8, 2023
auto_awesome
Crystal Trawny, Optiv’s Practice Director, delves into the evolution of Privileged Access Management (PAM) with insightful discussions on overcoming change resistance, deployment timelines, and critical program elements. She emphasizes the correlation between endpoint privilege management and PAM maturity, offering valuable insights to assess and enhance organizational security strategies.
Effective communication is key in cybersecurity deployments, focusing on people's needs and job success.
Identity is now a strategic focus in security, leading to comprehensive projects like endpoint management and service account lifecycle.
Deep dives
The People Aspect of Cybersecurity Deployments
Enterprise cybersecurity deployments focus on how technology impacts people's day-to-day lives. Understanding how to communicate changes, alleviate pain points, and enhance job success is crucial. Experts like Crystal Trani support organizations in managing change effectively.
Evolving Identity Security Strategies
Changes in identity security strategies have shifted from tactical compliance focus to executive-led strategic initiatives. The importance of identity at the center of security is now widely recognized, leading to more comprehensive and phased projects, such as endpoint management and service account lifecycle.
Adapting to New Security Threats and Technologies
Organizations are facing challenges in planning and executing cybersecurity programs effectively. Just-in-time access, endpoint privilege controls, and addressing ransomware threats are key considerations. Balancing least privilege controls with operational efficiency requires understanding user needs and ensuring security without hindering productivity.
Crystal Trawny, Optiv’s Practice Director, Privileged Account and Endpoint Privilege Management (PAM/EPM), joins host David Puner in exploring the ever-evolving identity landscape and how emerging threats impact organizations’ cybersecurity requirements. Through the eyes of an end user, Trawny shares best practices for overcoming change resistance, creating effective deployment timelines and avoiding scope creep. This episode maps the correlation between critical program elements – such as robust endpoint privilege management and dynamic access controls – and privileged access management (PAM) maturity. In the face of complexity and ransomware, insider threats and other sophisticated cyberattacks, organizations can use these insights to help assess their current strategy and chart a course for success.
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode