« Back

-

Track 2

Protect Your Privileged Accounts

Organizations implement privileged access management (PAM) to protect against the threats posed by credential theft and privilege misuse. Monitoring, controlling, and securing all identities across government agencies and systems is fundamental to a comprehensive cybersecurity strategy. Join us as we discuss how to best secure infrastructures and applications to maintain confidentiality of sensitive government data – and how PAM can help agencies reduce cyberattacks.

Speakers

Jay Gazlay
Information Security Specialist, CISA
Department of Homeland Security
Gram Slingbaum
Solutions Engineer, Federal
CyberArk