SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
World®
’16
Tech	Talk:	How	Do	You	Measure	
Up?	A	Maturity	Model	for	
Privileged	Access	Management
Shawn	W.	Hank	– Sr.	Principal	Consultant,	Cybersecurity
CA	Technologies
SCT41T
SECURITY
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
As	security	and	risk	professionals	increasingly	focus	on	the	need	for	
privileged	access	management	within	their	organizations,	a	number	of	
questions	arise.	Are	critical	functions	being	addressed?	Are	the	
appropriate	processes	and	management	oversight	in	place?	How	can	
the	overall	privileged	access	management	program	be	improved?	What	
areas	need	more	focus	to	improve	program	effectiveness?	
In	this	session,	we’ll	discuss	a	privileged	access	management	maturity	
model	– focused	on	key	technology,	process,	and	management	activities	
and	capabilities	– that	security	teams	can	use	to	baseline	their	privileged	
access	management	program	and	identify	areas	for	improvement	and	
future	refinement.
Shawn	W.	
Hank
CA	Technologies,	Inc.
Sr.	Principal	Consultant	
Cybersecurity
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	risk	and	potential	
for	security	breaches	
exist	anywhere	there	
are	privileged	
accounts.
Privileged	Accounts	
are	everywhere;	 ergo	
potential	vectors	of	
compromise	exist	
everywhere.
Your	Privileged	
Accounts	Are	valuable	
Targets!	
And	they	are	a	critical	
component	of	your	
overall	security	
posture.
Privileged	Accounts	
Grow	in	Numbers	
Everyday.
They	exist	in	all	layers	
of	any	organizations	
IT	stack:
- Infrastructure
- Front	End
- Middleware
- Backend
Existing	Models	of	
Managing	Privileged	
Accounts	Fall	Short.
Every	Major	Breach	
Has	Involved	A	
Privileged	Account
Privileged	Account	Management	Facts
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
PAM	Maturity	– Level	0/1
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
PAM	Focus	Areas	– Level	1
§ Examples
– root,	oradba,	sapadmin,	cisco	enable,	Windows	local	admin,	
named	admin	accounts,	SaaS/IaaS/PaaS	admin	accounts
§ Why
– If	you	control	access	to	the	accounts	as	well	as	their	passwords,	
you	can	control	privileged	actions	and	who	can	make	them
§ Hint
– Public	discussions	about	monitoring	and	audit	are	a	big	deterrent	of	
unwanted	behavior
Privileged	Users	/	Shared	Accounts
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
PAM	Maturity	– Level	1/2
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
PAM	Focus	Areas	– Level	2
§ Examples
– SIEM,	Network	Monitoring,	Change	Management,	Session	Recording,	
Analytics
§ Why
– Proactive	vs.	Reactive
§ Hint
– Automated	remediation	is	faster	than	human	action.	Think	SecOps	or	
DevSecOps
Activity	Monitoring
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
PAM	Focus	Areas	– Level	2/3
§ Examples
– COTS	applications,		application	&	middleware	Servers,	DevOps	
(CI	and/or	Orchestration)	Systems,	Scheduled	Tasks,	Batch	Jobs,	Scripts
§ Why
– Our	experience	tells	us	there	are	5	to	7	times	as	many	application	
accounts	as	there	are	human,	interactive	accounts.	The	threat	is	larger	
in	this	context.
§ Hint
– Start	small	and	build	over	time,	incorporating	with	SDLC
Service	&	Application	Accounts
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
PAM	Focus	Areas	– Level	3/4
§ Examples
– CA	Identity	Suite,	CA	Identity	Service,	Oracle	IAM,	SailPoint,	
IBM	Security	Identity	Manager
§ Why
– PAM	solutions	should	not	provision	accounts.	
– Integration	with	IDM	tools	allows	for	programmatic	provisioning	and	
removal	of	accounts	and	credentials	as	well	as	certification	and	
accreditation	when	needed.
Identity	Management	Integration
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
PAM	Focus	Areas	Level	3/4
§ Examples
– CA	PAM	SC,	Symantec	CSP,		Dell	UPM,	PowerBroker,	ViewFinity
§ Why
– PAM	focus	has	been	primarily	on	the	server	side	of	the	equation.	
– Most		privileged	accounts	compromises	happened	on	client	endpoint	
systems	(i.e.,	managed	and	unmanaged	laptops,	etc.)
– Moving	the	PAM	function	closer	to	the	user	environment	(aka	
endpoint)	is		a	logical	progression.	
Fine	Grained	Controls
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Privileged	Access	Management	Maturity	Model
Level	0
Level	1
Ad	Hoc	/ Manual
Level 2
Baseline
Level	3
Managed
Level	4
Advanced
Privileged
User/Shared	Accounts
Not	managing	or	
rotating	credentials
Manual	Controls
For	 Privileged	Accounts
Basic	Vault
Structured	Controls
Account	Inventory
SDLC	Integration
Credential	Vault	w/	RBAC
Central	Password	Policies
Account	Discovery		
MFA	
Password-less	
(SAML/OAUTH/TGS)
Cloud/SaaS/SDN &
HSM	Integration
Service	&
Application Accounts
No	knowledge of	
Application	accounts
Ad	Hoc	Application
Account	Management
Hard	Coded	Passwords
Manual	Application
Account	Management
Centralized	A2A Mgmt.
No	Hardcoded	Creds.
REST	API	Integration
Governed	A2A
DevOps	Integration
Monitoring	&	
Threat	Detection
No	monitoring of	
account	usage
Ad	Hoc	Audit	&	Controls
Activity	Monitoring
Decentralized logging
SIEM	Integration
Account	Attribution
SNMP	Alerting
Session	Recording
Meta-Data
Service	Desk Workflow	&
Analytics	Integration	
Identity	
Management
Integration
Manual provision,	no	
certification	or	
accreditation	
Manual	Process
For	Privileged	Access
Automated	
Privileged	Identity	
Mgmt.
Integrated	Privileged
Access	Requests	
Basic	Governance
Fully	Delegated	
Administration	
Governed	Privileged
Access	w/SoD	
Fine-grained	
Controls/SoD
Non	existent	
Open	Source	
Tools	and	Scripts
Decentralized
Tools	(Silos)
Command	Filtering
Restricted	Shell
Leap	Frog	Prevention	
Centrally	Managed	
Kernel	Interceptor
with	Cred Vault	
Integration
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Do	you	have	a	record	of	
credential	access?
- The	5	W's:	Who,	What,	
When,	Where,	Why?
Questions	to	Consider
How	is	privileged	account	
access	granted?
Do	you	have	an	inventory	of	
Privileged	Accounts?
- Interactive	&	
Programmatic?
Are	privileged	accounts	
included	in	the	SDLC	
process?
- for	3rd Party	Developers	and	
Contractors?
How	do	you	grant	
emergency	access	to	
privileged	accounts?
How	to	you	track	the	usage	
of	privileged	accounts?
If	yes,	how	often	are	you	
rotating	privileged	account	
credentials?	
Do	you	have	a	policy	and	
process	for	rotating	
privileged	account	
credentials?
Do	you	require	a	change	
ticket	for	privileged	account	
use?
Do	you	have	SoD	for	
privileged	accounts?
- How	is	SoD	enforced?
What	is	the	current	
certification	process	for	
privileged	accounts?
How	are	new	privileged	
accounts	created?
- What	does	the	workflow	
look	like?
What	is	your	approach	for	
managing	privileged	
accounts	that	live	in	the	
cloud?
- IaaS,	PaaS,	Saas?
Is	Multi-Factor	
Authentication	a	
requirement	to	access	
privileged	accounts?
Is	privileged	account	access	
monitored	for	suspicious	
activity?
Are	fine-grained	controls	in	
place	to	restrict	the	scope	of	
privileged	accounts?
- How	is	this	managed?
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
PAM	Focus	Areas	– Level	3/4
ADVANCED
Review
Redefine
Optimize
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Privileged	Account	Management	Maturity	Model
Whether	you	haven't	started,	have	just	begun,	or	are	in	the	throes	of	a	Privileged	Access	Management	
project,	there	are	several	items	to	consider.	It	is	our	hope	that	the	framework	we	have	provided	here	will	
start	a	discussion	and	assist	you	as	you	move	forward.	
Let	us	know	how	we	can	help!
Summary
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
SCT39T	 PAM	for	Hybrid	Enterprises 11/17/2016	at	1:45	pm
SCT36T Real-time	Identity	Analytics		 11/16/2016	at	3:00	pm
SCT43T Threat	Analytics	for	PAM 11/17/2016	at	4:30	pm
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Don’t	Miss	Our	INTERACTIVE
Security	Demo	Experience!
SNEAK
PEEK!
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Security
For	more	information	on	Security,	please	visit:	
http://cainc.to/EtfYyw

Más contenido relacionado

La actualidad más candente

Certified SOC Analyst
Certified SOC AnalystCertified SOC Analyst
Certified SOC AnalystSagarNegi10
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsMark S. Mahre
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NetLockSmith
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedSounil Yu
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and complianceMagdalena Matell
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecuritySounil Yu
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations CenterSiemplify
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdfPCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdfControlCase
 

La actualidad más candente (20)

Certified SOC Analyst
Certified SOC AnalystCertified SOC Analyst
Certified SOC Analyst
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
SOC2 Intro and Mindfulness
SOC2 Intro and MindfulnessSOC2 Intro and Mindfulness
SOC2 Intro and Mindfulness
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdfPCI DSS v4 - ControlCase Update Webinar Final.pdf
PCI DSS v4 - ControlCase Update Webinar Final.pdf
 

Destacado

Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerDeep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerCA Technologies
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital AgeCA Technologies
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...CA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
 
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?CA Technologies
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT
 
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? CA Technologies
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...CA Technologies
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InCA Technologies
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyCA Technologies
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSCA Technologies
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...CA Technologies
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.Priyanka Aash
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...CA Technologies
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016Lance Peterman
 

Destacado (17)

Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerDeep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
 
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016
 

Similar a Tech Talk: Privileged Account Management Maturity Model

Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesPre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesCA Technologies
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesCA Technologies
 
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM MaturityIt’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM MaturityCA Technologies
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementCA Technologies
 
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...CA Technologies
 
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessPre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessCA Technologies
 
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...CA Technologies
 
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...CA Technologies
 
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...CA Technologies
 
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...CA Technologies
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldCA Technologies
 
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...CA Technologies
 
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...Laurie Desautels
 
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...CA Technologies
 
Business Transformation Framework
Business Transformation FrameworkBusiness Transformation Framework
Business Transformation FrameworkKunal Sharma
 
[Webinar slides] A Holistic Approach to Digital Transformation
[Webinar slides] A Holistic Approach to Digital Transformation[Webinar slides] A Holistic Approach to Digital Transformation
[Webinar slides] A Holistic Approach to Digital TransformationAIIM International
 
The President Of A Company
The President Of A CompanyThe President Of A Company
The President Of A CompanyNavy Savchenko
 
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
Organizational and Technical Strategies for Achieving the Lean-Agile EnterpriseOrganizational and Technical Strategies for Achieving the Lean-Agile Enterprise
Organizational and Technical Strategies for Achieving the Lean-Agile EnterpriseCA Technologies
 
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...CA Technologies
 

Similar a Tech Talk: Privileged Account Management Maturity Model (20)

Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesPre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
 
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM MaturityIt’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
It’s Time to Grow Up: Eight Areas to Increase ITSM Maturity
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
 
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
Technology Primer: Learn the Basics—APM 101 and a Holistic View of the Applic...
 
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessPre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
 
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
 
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
 
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
Hands-On Lab: Tune CA Performance Management for an Optimal Network Performan...
 
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
 
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
 
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
GTEC 2016 beyond waterfall lessons learned on agile in digital government, Pw...
 
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
 
Business Transformation Framework
Business Transformation FrameworkBusiness Transformation Framework
Business Transformation Framework
 
Choosing the right benefits tech webinar
Choosing the right benefits tech webinarChoosing the right benefits tech webinar
Choosing the right benefits tech webinar
 
[Webinar slides] A Holistic Approach to Digital Transformation
[Webinar slides] A Holistic Approach to Digital Transformation[Webinar slides] A Holistic Approach to Digital Transformation
[Webinar slides] A Holistic Approach to Digital Transformation
 
The President Of A Company
The President Of A CompanyThe President Of A Company
The President Of A Company
 
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
Organizational and Technical Strategies for Achieving the Lean-Agile EnterpriseOrganizational and Technical Strategies for Achieving the Lean-Agile Enterprise
Organizational and Technical Strategies for Achieving the Lean-Agile Enterprise
 
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
 

Más de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Más de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Tech Talk: Privileged Account Management Maturity Model