IE11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Improve Your Compliance Posture with Identity-Centric PAM

April 15, 2020 | 2:00 PM3:00 PM

This webinar provides insights into the state of government regulations and importance of privileged management in the context of compliance and governance.

Many modern hybrid enterprises and government agencies are struggling to ensure they have security controls everywhere necessary as well as being able to prove their effectiveness, especially with so many shared privileged accounts.

Ever-changing industry as well as government regulations make it difficult to get and stay compliant. In order to reassure customers and the public that confidential data such as credit cards and health records are kept private, many organizations must adhere to government and industry mandates like PCI DSS, GDPR, SOX, Singapore MAS, NIST, FISMA and HIPAA.

This webinar provides practitioners insights into the state of industry and government regulations and explores how Identity-Centric Privileged Access Management (PAM) can help organizations to control, audit, and report on privileged access to sensitive data while reducing complexity and keeping administrative users productive.

Join cybersecurity evangelist Dr. Torsten George, an internationally recognized IT security expert, author, and speaker, when he discusses the following topics:

  • The latest trends in industry and government regulations;
  • The importance of privileged access management in the context of compliance and governance;
  • The concept of Identity-Centric PAM and how it helps organizations to establish granular security controls meeting the most stringent industry and government regulations while easing the burden of gathering all necessary data for upcoming audits;
  • And a live demonstration on Identity-Centric PAM.

Your next audit is just around the corner! Join our webinar to get a head start.

Register Now at

www.centrify.com/lp/webinar-improve-your-compliance-posture/?ls=701-048-techwire&utm_source=techwire&utm_medium=pub&utm_adgroupid=&utm_term=&=CompPos&utm_campaign=webinar

Speaker:

Dr. Torsten George
Cyber Security Evangelist
Centrify