IE11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Improve Your Compliance Posture with Identity-Centric PAM

April 15, 2020 | 2:00 PM3:00 PM

This webinar provides insights into the state of government regulations and importance of privileged management in the context of compliance and governance.

Many modern hybrid enterprises and government agencies are struggling to ensure they have security controls everywhere necessary as well as being able to prove their effectiveness, especially with so many shared privileged accounts.

Ever-changing industry as well as government regulations make it difficult to get and stay compliant. In order to reassure customers and the public that confidential data such as credit cards and health records are kept private, many organizations must adhere to government and industry mandates like PCI DSS, GDPR, SOX, Singapore MAS, NIST, FISMA and HIPAA.

This webinar provides practitioners insights into the state of industry and government regulations and explores how Identity-Centric Privileged Access Management (PAM) can help organizations to control, audit, and report on privileged access to sensitive data while reducing complexity and keeping administrative users productive.

Join cybersecurity evangelist Dr. Torsten George, an internationally recognized IT security expert, author, and speaker, when he discusses the following topics:

  • The latest trends in industry and government regulations;
  • The importance of privileged access management in the context of compliance and governance;
  • The concept of Identity-Centric PAM and how it helps organizations to establish granular security controls meeting the most stringent industry and government regulations while easing the burden of gathering all necessary data for upcoming audits;
  • And a live demonstration on Identity-Centric PAM.

Your next audit is just around the corner! Join our webinar to get a head start.

Register Now at

www.centrify.com/lp/webinar-improve-your-compliance-posture/?ls=701-048-techwire&utm_source=techwire&utm_medium=pub&utm_adgroupid=&utm_term=&=CompPos&utm_campaign=webinar

Speaker:

Dr. Torsten George
Cyber Security Evangelist
Centrify

As organizations continue their digital transformation journeys, they struggle to manage identities that are fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs. Centrify Identity-Centric PAM addresses this challenge with a cloud-native solution that simplifies privilege management by centralizing identities, and establishes a per-machine root of trust. Administrative management and access is seamless, security and co