Early-bird Discount
expires in
Register Now

Agenda

Privileged Access Management in Hybrid IT Environments

Privileged Access Management in Hybrid IT Environments

Combined Session
Thursday, May 08, 2025 14:50—15:10
Location: B09

With nearly three in four organizations worldwide operating in hybrid IT environments, the systems’ interconnections introduce unique security challenges. A breach in one area—whether on-premises or in the cloud—can quickly ripple across the entire infrastructure. For example, a compromised on-premises privileged account could provide a gateway for attackers to exploit cloud environments like Entra ID.
Misconfigurations, overly permissive service accounts, and exposed credentials are common entry points for these attacks, enabling lateral movement and potentially leading to a data breach. Threat actors often exploit simple oversights, such as privileged accounts with excessive permissions or poorly secured local admin accounts tied to cloud identities.
This discussion will explore how these attacks unfold and practical steps to mitigate risks. We'll dive into strategies like just-in-time access and zero-standing privilege to help reduce attack paths and strengthen overall security in hybrid IT environments.
Join this session to learn how to:
- Mitigate the Entra ID / On-Prem hybrid attack path.
- Leverage just in time orchestration to prevent lateral movement.
- Dynamically delegate just-enough access (JEA) for administrators.
- Move to a Zero Standing Privilege (ZSP) strategy for your organization.
- Deploy friction-free tools to facilitate access.
Martin Cannard
VP of Product Strategy
Netwrix
Accomplished VP of Product Strategy at Netwrix with 30-year track record of success from startups to enterprise software organizations, Martin Cannard is specifically experienced in the privileged...
Almost Ready to Join the EIC 2025?
Reach out to our team with any remaining questions
Get in touch