Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CXOInsights by CXOCIETY

PodChats for FutureCISO: Modernising PAM strategies for a security-first world

06 Nov 2024

Description

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands used to administer or configure systems and applications. Available as software, SaaS or hardware appliances, PAM tools manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines four distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, and cloud infrastructure entitlement management (CIEM).It is widely expected that in 2025, PAM will be shaped by advancements in artificial intelligence, machine learning, and automation, enabling more proactive and adaptive security measures. As regulatory compliance becomes more stringent across various industries in Asia, organizations will be compelled to adopt robust PAM solutions to safeguard sensitive data and ensure accountability. The convergence of hybrid work environments and cloud technologies will also necessitate re-evaluating PAM strategies, emphasizing the need for flexible yet secure access controls.In this PodChats for FutureCISO, Phil Calvin, Chief Product Officer, Delinea, shares his views on some of CISOs' approaches when modernising PAM strategies for a security-first world.1.       How have PAM tools and strategies evolved in the last two years following hybrid work, the shift to the cloud, and more recently the heightened interest in AI, ML and automation?2.       For those that have already started to embed AI, ML and automation into their PAM strategies, what has worked and not worked?3.       Any lessons learned when it comes to integration AI and ML into existing PAM implementations?4.       What metrics should CISOs use to measure the effectiveness of their PAM solutions and practices?5.       Given the heightened interest around data privacy and protection, but disparate guidelines and frameworks, what steps should CISOs/enterprises take to ensure compliance with regional regulations concerning privileged access? 6.       How can CISOs ensure that their PAM solutions are scalable as the organization grows?7.       What role does zero-trust play in PAM strategies and how do you see zero trust evolving in 2025 to PAM implementations?8.       How do you see enterprises leveraging identity governance to strengthen their PAM initiatives? 9.       Our topic is modernising PAM strategies for a security-first world, what’s in store for Privilege Access Management in 2025?

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.