Access Management , Identity & Access Management , Incident & Breach Response
Making Privileged Access Manageable
CyberArk's Barak Feldman on a Phased Approach to Improving PAMIt's easy to draw a direct link between high-profile breaches and the compromise of user credentials. But it requires a phased approach to actually improve privileged access management, says Barak Feldman of CyberArk.
See Also: Office 365 Threat Simulation
In a video interview at Information Security Media Group's recent Washington Fraud and Breach Prevention Summit, Feldman, national director for the privileged account security solution portfolio at CyberArk, discusses:
- The link between breaches and access;
- How to make privileged access management more manageable;
- Where to start and who should lead a PAM initiative.
Feldman joined CyberArk in 2001 and has held several sales and technical roles. including managing the system engineering group in the Americas. He has more than 15 years of experience in designing and implementing security and compliance solutions at Fortune 500 companies and at various federal agencies. He has in-depth technical knowledge related to the most crucial areas of information security, including regulatory compliance, policy management and access management, specifically with the current threats surrounding privileged access to the highest-risk assets within the enterprise.