BSides Las Vegas 2018: Can Data Science Deal With PAM?

In this talk, Panaseer’s Leila Powell reframes Privileged Access Management (PAM) as a data science problem and explores what insight you can glean from your data about where the problem lies and how to fix it.

Find our Privacy Policy here

BSides Las Vegas 2018: Can Data Science Deal With PAM?
Document preview below...

Talk to an expert

Fill out the form below and one of our experts will get back to you shortly.

Find our Privacy Policy here

PAM is climbing the security charts, coming in at no. 4 in the latest CIS controls, up from no. 5 in the previous version. It has also piqued the interest of the Board: it is easy to grasp the concept of a superuser with the potential to wreak havoc on critical business systems because you’ve given them the keys to your front door.

Security teams now find themselves thrust into the spotlight, with the C-suite demanding answers while they grapple with this seemingly intractable problem.

“As one CISO put it, PAM is ‘at the intersection of human behaviour and technical controls and often brings IT and security into conflict’.”