+44 (0) 203 588 3023

PAM has changed a great deal over the last twenty years, evolving repeatedly to keep pace with the ever-changing security landscape. In this webinar, we explore the history of PAM and examine its applicability against modern-day threats such as ransomware; you will learn about the benefits, the pitfalls, and everything in between.  

PAM, PAM or PAM: A Comprehensive Workshop on Securing Privileged Activity

LIVE WEBINAR

WATCH THE WEBINAR TO DISCOVER:

How to achieve zero standing privilege and just-in-time defence

How adopting a Zero Trust model can help you strengthen security

What the relationship is between Netflix and traditional PAM  

Presenter

Martin Cannard

VP of Product Strategy

at Stealthbits now part of Netwrix

Martin is an experienced technologist, with over 30 years in the Privileged Access Management and security space. Prior to Stealthbits, Martin led the privileged access team at BeyondTrust where he took their password management solution from unknown to a recognized leader in the industry within 3 years. At BeyondTrust he also drove the development of their first SaaS PAM product as well as a new micro service-based platform for DevOps security. Prior to BeyondTrust, Martin held key management positions at Quest/Dell, Novell, Fortefi and Symantec. He is a recognized expert and a regular speaker for security events and webinars.

Moderator

Lee Neely

Senior security professional at LLNL

ISSA International Board Member

Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a current ISSA International Board Member and former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

5 New Street Square, London EC4A 3TW | Phone: +44 (0) 203 588 3023

Corporate Headquarters: 300 Spectrum Center Drive, Suite 200 Irvine, CA 92618 | International: 1-949-407-5125

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

5 New Street Square, London EC4A 3TW

Phone: +44 (0) 203 588 3023

+44 (0) 203 588 3023

PAM has changed a great deal over the last twenty years, evolving repeatedly to keep pace with the ever-changing security landscape. In this webinar, we explore the history of PAM and examine its applicability against modern-day threats such as ransomware; you will learn about the benefits, the pitfalls, and everything in between.  

PAM, PAM or PAM:

A Comprehensive Workshop

on Securing Privileged Activity

LIVE WEBINAR

WATCH WEBINAR TO DISCOVER:

How to achieve zero standing privilege and just-in-time defence

How adopting a Zero Trust model can help you strengthen security

What the relationship is between Netflix and traditional PAM  

Moderator

Martin Cannard

VP of Product Strategy

at Stealthbits now part of Netwrix

Lee Neely

Senior security professional at LLNL

ISSA International Board Member

Presenter

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

5 New Street Square, London EC4A 3TW | Phone: +44 (0) 203 588 3023

Corporate Headquarters: 300 Spectrum Center Drive, Suite 200 Irvine, CA 92618 | International: 1-949-407-5125

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

5 New Street Square, London EC4A 3TW

Phone: +44 (0) 203 588 3023