The Power of PAM: Enhancing your cybersecurity framework through PAM
Join KeyData and Treasury Board Secretariat for this educational session on PAM. Register now to save your seat.
Industry threat reports consistently find that 80% * of all successful breaches studied in a given year involve the use of stolen privileged user credentials. It’s no surprise that Privileged Access Management or PAM is currently ranked #3 on the Canadian Security Establishment (CSE) Top 10 IT Security Actions.
Organizations are finding that assigning and managing privilege access is becoming more challenging as pubic cloud, BYOD, telecommuting and managed services blur the line between insiders and outsiders. We learned that 40%** of Canadian companies have already suffered a cyber attack.
Join us for this complimentary seminar and learn from industry experts (from TBS and KeyData) on the cutting edge of PAM and IAM governance and implementation. The KeyData team have successfully deployed approximately 100 PAM and Identity and Access Management (IAM) programs across Canada and will share their best practices and expertise on compliance and deployment.
Attend this seminar and learn :
- Overview of Government of Canada's Digital Identity Strategy
- Tools, techniques and methods used by attackers to steal sensitive data, takeover networks and cloud instances by gaining access to privileged credentials
- How to get started with a privileged account security program that integrates easily with your existing on-prem and cloud infrastructure, SaaS applications, and security management tools
- Best Practices for IAM and PAM
- Key questions to ask when planning your PAM and IAM deployments
7:30am - 8:15am - Breakfast and Registration (Grill 41, 100 Lord Elgin)
8:15am - 8:25am - Welcome and Introductions. Rosa Caputo, CEO KeyData Associates
8:25am - 8:55am - Keynote Address: Government of Canada's Digital Identity Strategy
Speaker: Imraan Bashir, Executive Director of Cyber Security within the Chief Information Officer Branch at Treasury Board Secretariat.
8:55am - 9:35am - Topic: Attacking the New Perimeter
Speaker: Brian Read, PAM Practice Lead at KeyData Associates The critical drivers for establishing a modern Privilege Access Management (PAM) program.
9:35am to 9:55am - Topic: Top 10 Best Practices for a Successful IAM/PAM Strategy and Deployment
Speaker: Rosa Caputo, KeyData Associates
9:55am - Wrap up and Adjourn
These sessions are very popular, and spaces fills quickly. Register now to save your seat.
**This is an invite-only, limited seating event. Your registration will be confirmed by a KeyData representative prior to the date.**