Identity & Access Management , Security Operations

Modernizing Your PAM Program – An Identity-focused Security Strategy

Optiv's Crystal Trawny and CyberArk’s Barak Feldman on Re-Shaping Identity Security
Crystal Trawny, practice director, privileged account and endpoint privilege management, Optiv; Barak Feldman, senior vice president, identity security GTM, CyberArk

Despite the acknowledgement that protecting identities is the key to securing data, identity-related breaches continue to make headlines. Crystal Trawny of Optiv and Barak Feldman of CyberArk discuss a new way to approach Privileged Access Management.

In this video interview with Information Security Media Group, these thought leaders discussed:

  • Real-world challenges around identity;
  • What security organizations need from PAM solutions;
  • How to overcome common mistakes in identity security programs.

Crystal Trawny is a Practice Director at Optiv supporting Privileged Account and Endpoint Privilege Management teams (PAM/EPM). With over 15 years of experience in Identity and Data Management, she is knowledgeable in Identity and Access Management policies, operational support and delivers projects across various industry verticals. Her portfolio includes several companies in the Fortune 500 as well as covering areas of financial services, energy, healthcare, technology, and manufacturing. Prior to her leadership role in PAM/EPM, Crystal held a variety of identity centric roles since joining Optiv in 2015.

Barak Feldman is Senior Vice President, Identity Security GTM at CyberArk Software. Joining CyberArk at 2001, Barak brings a deep technical and business background with over 20 years of experience in designing and implementing security and compliance solutions at many of the Fortune 500. In his role Barak leads CyberArk’s Privileged Access Management (PAM) business and is helping the company define and lead the Identity Security market; primarily focusing on Cloud Entitlements, Secrets Management, Least Privilege and Just in time. His expertise includes Regulatory Compliance, Access Management and specifically the current threats surrounding privileged access to the highest risk assets within the enterprise.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.