In 2023, the Zero Trust concept permeates cybersecurity departments across private and public organizations alike. When it comes to identity access management (IAM) and privilege access management (PAM), Zero Trust initiatives can strengthen security defenses against cyber threats that utilize social engineering techniques, credential-stealing malware, privilege sprawl, and lateral movement.
This webinar performs a quick survey of the efficacy of established privilege access management approaches, compares them to advanced PAM technologies, and outlines how different IAM and PAM strategies can be leveraged on the Zero Trust journey.
You will learn:
- Zero Trust concepts in the IAM/PAM context, such as Zero Standing Privilege
- TTPs that circumvent commonly used security toolsets
- Best practices to adopt as part of Zero Trust initiatives