PAM is a critical pillar of an Identity-Centric strategy, and it's much more than just credential management. To get the full value out of your PAM program and lower risk across the entire organization, you need to address much more than the common activities like Session Management or Remote Access.

During this workshop, we'll dive into the larger PAM ecosystem. We'll define the areas you should consider, discuss the rationale and the value of addressing them, and provide steps you can take to build a mature program.

The topics covered during this workshop include:

  • Defining the full PAM ecosystem and the value it provides (CIEM, CI/CD Automation, JIT, Reporting, PUBA, etc.).
  • The critical role PAM plays in an Identity Fabric.
  • Why your identity-centric strategy needs to address all of PAM and move beyond it.
  • A strategy for conveying time to value to Enterprise leadership (a common challenge).
  • How to evolve your identity strategy with unified visibility, ITDR, and CIEM.

We’ll be raffling off two $100 Amazon gift cards to the most engaged attendees! We look forward to hosting you.

David Morimanno
David Morimanno
Director of IAM Technologies, Integral Partners
As a Director of Identity & Access Management Technologies, David helps clients develop IAM and Zero Trust strategies that work in complex organizations. He's an active practitioner and strategist, with nearly 20 years of hands-on experience in i ... read more

As a Director of Identity & Access Management Technologies, David helps clients develop IAM and Zero Trust strategies that work in complex organizations. He's an active practitioner and strategist, with nearly 20 years of hands-on experience in implementing market-leading IAM technologies across IGA, PAM, and Access Management. He specializes in building IAM Programs, administering IAM tools, and developing long-term strategies to support organizational objectives and business enablement.

David has a passion for cybersecurity. He is a trusted advisor for Fortune 500 clients and has helped industry executives successfully execute large-scale IAM programs through deployment. He has extensive experience in financial services, energy, education, manufacturing, and healthcare industries.

As a Director of Identity & Access Management Technologies, David helps clients develop IAM and Zero Trust strategies that work in complex organizations. He's an active practitioner and strategist, with nearly 20 years of hands-on experience in i ... read more
David Morimanno
Director of IAM Technologies, Integral Partners

As a Director of Identity & Access Management Technologies, David helps clients develop IAM and Zero Trust strategies that work in complex organizations. He's an active practitioner and strategist, with nearly 20 years of hands-on experience in implementing market-leading IAM technologies across IGA, PAM, and Access Management. He specializes in building IAM Programs, administering IAM tools, and developing long-term strategies to support organizational objectives and business enablement.

David has a passion for cybersecurity. He is a trusted advisor for Fortune 500 clients and has helped industry executives successfully execute large-scale IAM programs through deployment. He has extensive experience in financial services, energy, education, manufacturing, and healthcare industries.

×
Christopher Hills
Christopher Hills
Chief Security Strategist, BeyondTrust
Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with Beyo ... read more

Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy. Chris has held the Sr Solution’s Architect, Deputy CTO, and Deputy CISO roles since starting with BeyondTrust. Chris is also co-author in the Cloud Attack Vectors book, a contributor in the New Privileged Attack Vectors book, and editor in previous books. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s college football career, going to the sand dunes off-roading.

Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with Beyo ... read more
  • X
  • LinkedIn profile link
Christopher Hills
Chief Security Strategist, BeyondTrust

Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy. Chris has held the Sr Solution’s Architect, Deputy CTO, and Deputy CISO roles since starting with BeyondTrust. Chris is also co-author in the Cloud Attack Vectors book, a contributor in the New Privileged Attack Vectors book, and editor in previous books. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s college football career, going to the sand dunes off-roading.

×
Want to learn why over 20,000 customers chose BeyondTrust?
Prefers reduced motion setting detected. Animations will now be reduced as a result.