Episode 097: 03‐20‐2025 Patterns and Anti‐patterns in Privileged Access Management (PAM) - GluuFederation/identerati-office-hours GitHub Wiki

Title: Patterns and Anti-patterns in Privileged Access Management (PAM)

Description

Managing privileged access is one of the most critical aspects of cybersecurity, yet organizations often struggle with implementing it effectively. In this episode of Identerati Office Hours, we’re joined by Rainer Hörbe, Senior Manager at KPMG, to explore the key patterns and anti-patterns in Privileged Access Management (PAM).

We’ll discuss:

  • 🔹 Common PAM pitfalls and how to avoid them
  • 🔹 Best practices for securing privileged accounts
  • 🔹 Strategies for balancing security, usability, and compliance
  • 🔹 Real-world insights on what works—and what doesn’t—in PAM

Join us for a deep dive into the do’s and don’ts of PAM with one of the industry’s leading experts. Whether you're designing a PAM strategy or optimizing an existing one, this session will provide actionable takeaways to strengthen your security posture.

Homework

Takeaways

TBD

Livestream Audio Archive

Will be Here