www.scmagazine.com Open in urlscan Pro
2606:4700:20::681a:d13  Public Scan

Submitted URL: https://go.scmagazine.com/dc/-vMdw_6ux1ia6WSIpe-HqwUBmRtNHNdPPZd5lYTFQklshSEgKC1AcpCaioHejoF4dNvMcRAf-U1D3JmAx7AuC9pDpWDeQ...
Effective URL: https://www.scmagazine.com/cybercast/modern-privileged-access-management-in-the-cloud-whats-in-whats-out?utm_source=marketi...
Submission: On July 19 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="password">Password</label><input placeholder="Password*" required="" type="password" id="password" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="firstName">First Name</label><input placeholder="First Name*" required="" type="text" id="firstName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="lastName">Last Name</label><input placeholder="Last Name*" required="" type="text" id="lastName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="companyName">Company Name</label><input placeholder="Company Name*" required="" type="text" id="companyName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="jobTitle">Job Title</label><input placeholder="Job Title*" required="" type="text" id="jobTitle" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="phone">Phone</label><input placeholder="Phone*" required="" type="text" id="phone" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="mb-4">
    <div>
      <div class="Registration_checkbox__qddY6 form-check"><input type="checkbox" id="ssoEditorialNewsletters" class="form-check-input"><label title="" for="ssoEditorialNewsletters" class="form-check-label">Yes, I would like to receive industry news
          alerts, the Daily Scan, and editorial updates from SC Media.</label></div>
    </div>
    <div>
      <div class="Registration_checkbox__qddY6 form-check"><input type="checkbox" id="ssoLearningNewsletters" class="form-check-input"><label title="" for="ssoLearningNewsletters" class="form-check-label">Yes, I would like to receive information
          about upcoming SC Media events, webcasts, and conferences.</label></div>
    </div>
  </div>
  <div class="fs-9 my-4">
    <p>By clicking the Create Account button below, you agree to SC Media <a class="text-underline" href="/terms-and-conditions">Terms and Conditions</a><span> and </span><a class="text-underline" href="/privacy-policy">Privacy Policy</a>.</p>
  </div><button type="submit" class="btn btn-primary">Create Account</button>
</form>

Text Content

Log inRegister
Topics
Events
Podcasts
Research
Recognition
Leadership
About CRA



MODERN PRIVILEGED ACCESS MANAGEMENT IN THE CLOUD: WHAT’S IN, WHAT’S OUT?

On-Demand Webcast|1 Hour

Since privileged access is usually the last link in the cyber kill chain,
Privileged Access Management (PAM) has evolved in importance from simple
password management to an essential cyber risk reduction imperative. 

Now is the time to redefine what it means to have a mature PAM program in
today’s multi-cloud world. Nearly half of all data breaches happen in the cloud
and 92% of organizations are currently hosting at least some of their IT
environment in the cloud. That means the majority of all businesses today have
experienced a breach and continue to be at risk. 

Join Saviynt for a conversation on what’s “in” and what’s “out” in a modern,
cloud privileged access management program:

 * Out: user friction, overprovisioning, and rubber-stamping
 * In: agile processes, zero-standing privilege (ZSP), and risk-based decision
   making

Topics and Takeaways:

 * Gaps in traditional PAM tools and approaches
 * Why a modern program must include just-in-time (JIT) PAM
 * Quick wins on the road to JIT PAM and ZSP
 * How Identity Governance and Privileged Access Management are converging to
   reduce risks and enhance productivity



Chris Owen

Director of Product Management

Saviynt

Chris is a Director of Product Management at Saviynt where he drives product
innovation, execution of the technology roadmap, and go-to-market strategies. He
has more than 15 years of experience in the identity access management and
privileged access management industry. Before Saviynt, Chris held various
technical and leadership roles at Quest / One Identity, CyberArk, BeyondTrust,
and Centrify.


SPEAKERS

Chris Owen
Director of Product Management


Chris is a Director of Product Management at Saviynt where he drives product
innovation, execution of the technology roadmap, and go-to-market strategies. He
has more than 15 years of experience in the identity access management and
privileged access management industry. Before Saviynt, Chris held various
technical and leadership roles at Quest / One Identity, CyberArk, BeyondTrust,
and Centrify.

Tom Spring
Editorial Director
SC Media

Tom Spring is Editorial Director for SC Media and is based in Boston, MA. For
two decades he has worked at national publications in the leadership roles of
publisher at Threatpost, executive news editor PCWorld/Macworld and technical
editor at CRN. He is a seasoned cybersecurity reporter, editor and storyteller
that aims always for truth and clarity.


SPONSORS


Log in
Register
Business Email
Password
First Name
Last Name
Company Name
Job Title
Phone
Yes, I would like to receive industry news alerts, the Daily Scan, and editorial
updates from SC Media.
Yes, I would like to receive information about upcoming SC Media events,
webcasts, and conferences.

By clicking the Create Account button below, you agree to SC Media Terms and
Conditions and Privacy Policy.

Create Account

--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies