PAM Best Practice
Facebook X LinkedIn

The Future role of PAM: Securing any Privileged Workload & Access

Combined Session
Thursday, May 11, 2023 15:50—16:30
Location: B 07-08

PAM (Privileged Access Management) is one of the established core disciplines within IAM. PAM also is the IAM discipline that is changing most from what it has been in the past.

On one hand, there is the impact of CIEM & DREAM, Cloud Infrastructure Entitlement Management or Dynamic Resource Entitlement & Access Management. This is about the expansion of PAM beyond humans accessing servers and selected applications towards any type of human and non-human (silicon) identity accessing any type of workload, from servers to dynamic cloud resources. This also implies an expansion from serving static data center infrastructures to dynamic workloads in today’s agile IT. PAM is changing, with more parties involved – a “PAMocracy”, as KuppingerCole Analyst Paul Fisher recently named it.

These changes also require expansions in integration to other IT services. There needs to be a dynamic governance approach, where IGA comes into play. It requires rethinking whether PAM tools really should care for authentication. There is no need for authentication point solutions in an age where most organizations have a strong Access Management solution with MFA, passwordless authentication and adaptive, risk- and context-based access in place. Finally, this new PAM must integrate with the DevOps tools chain for permanent updates about new code and the resources used as well as with IT Asset Management for an always up-to-date insight into the ever-changing, dynamic IT landscape that needs to be protected.

Also worth to think about is integration with further security solutions, beyond the standard SIEM/SOAR integration. AI-powered security solutions are one aspect. Integration to Cloud Security Posture Management is another example.

In this panel, the state and requirements on the future PAM will be discussed.

Matthias Bauer
Matthias Bauer
One Identity
Matthias Bauer is the Senior Manager of Product Development for Identity Manager and Senior architect for Identity Governance solutions. Prior to One Identity, Matthias was at Dell Security and...
Anil Bhandari
Anil Bhandari
ARCON TechSolutions
Anil Bhandari is an inspired innovator, technologist, and thought leader in Information Risk Management. He serves as a Mentor & Thought Leader and provides his invaluable insights for the...
Morey J. Haber
Morey J. Haber
BeyondTrust
Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT...
Filipi Pires
Filipi Pires
senhasegura
I’ve been working as Security and Threat Researcher and Cybersecurity Advocate at senhasegura, Founder at Black&White Technology, Snyk Ambassador, Application Security Specialist and...
Frank Schmaering
Frank Schmaering
Saviynt
Frank Schmaering is an experienced speaker and tech enthusiast who specialises in IGA, GRC, PAM and authentication topics. He speaks passionately about identity governance, identity modernisation...
Subscribe for updates
Please provide your email address