www.scmagazine.com
Open in
urlscan Pro
2606:4700:20::681a:d13
Public Scan
Submitted URL: https://go.scmagazine.com/dc/-vMdw_6ux1ia6WSIpe-HqwUBmRtNHNdPPZd5lYTFQklshSEgKC1AcpCaioHejoF4dNvMcRAf-U1D3JmAx7AuC9pDpWDeQ...
Effective URL: https://www.scmagazine.com/cybercast/modern-privileged-access-management-in-the-cloud-whats-in-whats-out?utm_source=marketi...
Submission: On July 19 via api from US — Scanned from DE
Effective URL: https://www.scmagazine.com/cybercast/modern-privileged-access-management-in-the-cloud-whats-in-whats-out?utm_source=marketi...
Submission: On July 19 via api from US — Scanned from DE
Form analysis
1 forms found in the DOM<form class="w-100" scmag-registration="set">
<div class="my-2 font-sans"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-sans"><label class="visually-hidden form-label" for="password">Password</label><input placeholder="Password*" required="" type="password" id="password" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-sans"><label class="visually-hidden form-label" for="firstName">First Name</label><input placeholder="First Name*" required="" type="text" id="firstName" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-sans"><label class="visually-hidden form-label" for="lastName">Last Name</label><input placeholder="Last Name*" required="" type="text" id="lastName" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-sans"><label class="visually-hidden form-label" for="companyName">Company Name</label><input placeholder="Company Name*" required="" type="text" id="companyName" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-sans"><label class="visually-hidden form-label" for="jobTitle">Job Title</label><input placeholder="Job Title*" required="" type="text" id="jobTitle" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="my-2 font-sans"><label class="visually-hidden form-label" for="phone">Phone</label><input placeholder="Phone*" required="" type="text" id="phone" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="mb-4">
<div>
<div class="Registration_checkbox__qddY6 form-check"><input type="checkbox" id="ssoEditorialNewsletters" class="form-check-input"><label title="" for="ssoEditorialNewsletters" class="form-check-label">Yes, I would like to receive industry news
alerts, the Daily Scan, and editorial updates from SC Media.</label></div>
</div>
<div>
<div class="Registration_checkbox__qddY6 form-check"><input type="checkbox" id="ssoLearningNewsletters" class="form-check-input"><label title="" for="ssoLearningNewsletters" class="form-check-label">Yes, I would like to receive information
about upcoming SC Media events, webcasts, and conferences.</label></div>
</div>
</div>
<div class="fs-9 my-4">
<p>By clicking the Create Account button below, you agree to SC Media <a class="text-underline" href="/terms-and-conditions">Terms and Conditions</a><span> and </span><a class="text-underline" href="/privacy-policy">Privacy Policy</a>.</p>
</div><button type="submit" class="btn btn-primary">Create Account</button>
</form>
Text Content
Log inRegister Topics Events Podcasts Research Recognition Leadership About CRA MODERN PRIVILEGED ACCESS MANAGEMENT IN THE CLOUD: WHAT’S IN, WHAT’S OUT? On-Demand Webcast|1 Hour Since privileged access is usually the last link in the cyber kill chain, Privileged Access Management (PAM) has evolved in importance from simple password management to an essential cyber risk reduction imperative. Now is the time to redefine what it means to have a mature PAM program in today’s multi-cloud world. Nearly half of all data breaches happen in the cloud and 92% of organizations are currently hosting at least some of their IT environment in the cloud. That means the majority of all businesses today have experienced a breach and continue to be at risk. Join Saviynt for a conversation on what’s “in” and what’s “out” in a modern, cloud privileged access management program: * Out: user friction, overprovisioning, and rubber-stamping * In: agile processes, zero-standing privilege (ZSP), and risk-based decision making Topics and Takeaways: * Gaps in traditional PAM tools and approaches * Why a modern program must include just-in-time (JIT) PAM * Quick wins on the road to JIT PAM and ZSP * How Identity Governance and Privileged Access Management are converging to reduce risks and enhance productivity Chris Owen Director of Product Management Saviynt Chris is a Director of Product Management at Saviynt where he drives product innovation, execution of the technology roadmap, and go-to-market strategies. He has more than 15 years of experience in the identity access management and privileged access management industry. Before Saviynt, Chris held various technical and leadership roles at Quest / One Identity, CyberArk, BeyondTrust, and Centrify. SPEAKERS Chris Owen Director of Product Management Chris is a Director of Product Management at Saviynt where he drives product innovation, execution of the technology roadmap, and go-to-market strategies. He has more than 15 years of experience in the identity access management and privileged access management industry. Before Saviynt, Chris held various technical and leadership roles at Quest / One Identity, CyberArk, BeyondTrust, and Centrify. Tom Spring Editorial Director SC Media Tom Spring is Editorial Director for SC Media and is based in Boston, MA. For two decades he has worked at national publications in the leadership roles of publisher at Threatpost, executive news editor PCWorld/Macworld and technical editor at CRN. He is a seasoned cybersecurity reporter, editor and storyteller that aims always for truth and clarity. SPONSORS Log in Register Business Email Password First Name Last Name Company Name Job Title Phone Yes, I would like to receive industry news alerts, the Daily Scan, and editorial updates from SC Media. Yes, I would like to receive information about upcoming SC Media events, webcasts, and conferences. By clicking the Create Account button below, you agree to SC Media Terms and Conditions and Privacy Policy. Create Account -------------------------------------------------------------------------------- ABOUT US SC MediaCyberRisk AllianceContact UsCareersPrivacy GET INVOLVED SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us EXPLORE Product reviewsResearchWhite papersWebcastsPodcasts Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions. COOKIES This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies. Accept cookies