Artwork

Inhoud geleverd door CXOCIETY | FutureCIO FutureCFO FutureIoT. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door CXOCIETY | FutureCIO FutureCFO FutureIoT of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

PodChats for FutureCISO: Modernising PAM strategies for a security-first world

12:17
 
Delen
 

Manage episode 448781865 series 2912947
Inhoud geleverd door CXOCIETY | FutureCIO FutureCFO FutureIoT. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door CXOCIETY | FutureCIO FutureCFO FutureIoT of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands used to administer or configure systems and applications.

Available as software, SaaS or hardware appliances, PAM tools manage privileged access for both people (system administrators and others) and machines (systems or applications).

Gartner defines four distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, and cloud infrastructure entitlement management (CIEM).

It is widely expected that in 2025, PAM will be shaped by advancements in artificial intelligence, machine learning, and automation, enabling more proactive and adaptive security measures. As regulatory compliance becomes more stringent across various industries in Asia, organizations will be compelled to adopt robust PAM solutions to safeguard sensitive data and ensure accountability. The convergence of hybrid work environments and cloud technologies will also necessitate re-evaluating PAM strategies, emphasizing the need for flexible yet secure access controls.

In this PodChats for FutureCISO, Phil Calvin, Chief Product Officer, Delinea, shares his views on some of CISOs' approaches when modernising PAM strategies for a security-first world.

1. How have PAM tools and strategies evolved in the last two years following hybrid work, the shift to the cloud, and more recently the heightened interest in AI, ML and automation?

2. For those that have already started to embed AI, ML and automation into their PAM strategies, what has worked and not worked?

3. Any lessons learned when it comes to integration AI and ML into existing PAM implementations?

4. What metrics should CISOs use to measure the effectiveness of their PAM solutions and practices?

5. Given the heightened interest around data privacy and protection, but disparate guidelines and frameworks, what steps should CISOs/enterprises take to ensure compliance with regional regulations concerning privileged access?

6. How can CISOs ensure that their PAM solutions are scalable as the organization grows?

7. What role does zero-trust play in PAM strategies and how do you see zero trust evolving in 2025 to PAM implementations?

8. How do you see enterprises leveraging identity governance to strengthen their PAM initiatives?

9. Our topic is modernising PAM strategies for a security-first world, what’s in store for Privilege Access Management in 2025?

  continue reading

425 afleveringen

Artwork
iconDelen
 
Manage episode 448781865 series 2912947
Inhoud geleverd door CXOCIETY | FutureCIO FutureCFO FutureIoT. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door CXOCIETY | FutureCIO FutureCFO FutureIoT of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands used to administer or configure systems and applications.

Available as software, SaaS or hardware appliances, PAM tools manage privileged access for both people (system administrators and others) and machines (systems or applications).

Gartner defines four distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, and cloud infrastructure entitlement management (CIEM).

It is widely expected that in 2025, PAM will be shaped by advancements in artificial intelligence, machine learning, and automation, enabling more proactive and adaptive security measures. As regulatory compliance becomes more stringent across various industries in Asia, organizations will be compelled to adopt robust PAM solutions to safeguard sensitive data and ensure accountability. The convergence of hybrid work environments and cloud technologies will also necessitate re-evaluating PAM strategies, emphasizing the need for flexible yet secure access controls.

In this PodChats for FutureCISO, Phil Calvin, Chief Product Officer, Delinea, shares his views on some of CISOs' approaches when modernising PAM strategies for a security-first world.

1. How have PAM tools and strategies evolved in the last two years following hybrid work, the shift to the cloud, and more recently the heightened interest in AI, ML and automation?

2. For those that have already started to embed AI, ML and automation into their PAM strategies, what has worked and not worked?

3. Any lessons learned when it comes to integration AI and ML into existing PAM implementations?

4. What metrics should CISOs use to measure the effectiveness of their PAM solutions and practices?

5. Given the heightened interest around data privacy and protection, but disparate guidelines and frameworks, what steps should CISOs/enterprises take to ensure compliance with regional regulations concerning privileged access?

6. How can CISOs ensure that their PAM solutions are scalable as the organization grows?

7. What role does zero-trust play in PAM strategies and how do you see zero trust evolving in 2025 to PAM implementations?

8. How do you see enterprises leveraging identity governance to strengthen their PAM initiatives?

9. Our topic is modernising PAM strategies for a security-first world, what’s in store for Privilege Access Management in 2025?

  continue reading

425 afleveringen

Toate episoadele

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding

Luister naar deze show terwijl je op verkenning gaat
Spelen