Privileged Identity & Access Management is a set of strategies and procedures employed to govern the elevated access and permissions for users (human and non-human), processes, and systems across the organization. Privileged Management is among the most necessary controls as it ensures that an organization’s value is well protected. It also encourages adaptation of many industry best security practices, such as Principle of Least Privilege, Just-In-Time Access, Secret Management, etc. thus minimizing attack surface, enhancing operational excellence, and achieving compliance.
Sudheer Karanam brings over 19 years of experience in the IT Industry with over 12 years dedicated to InfoSec. His expertise includes many Information security domains such as User Profile Management, Personally Identifiable Information, Single Sign On, OAuth, OpenId, Device Identity, Risk Adaptable Access controls, Privileged Identity and Access Management, Secrets Management, and PCI (Payment Card Industry) standards & processes. He also holds security certifications such as Certified Ethical Hacker (CEH) and CISSP.
Agenda:
5:00 – Socializing/networking
5:05 – Announcements
5:10 – Presentation
There’s usually more time for networking after the talk as well.
Sudheer Karanam: Privilege Identity & Access Management
Privileged Identity & Access Management is a set of strategies and procedures employed to govern the elevated access and permissions for users (human and non-human), processes, and systems across the organization. Privileged Management is among the most necessary controls as it ensures that an organization’s value is well protected. It also encourages adaptation of many industry best security practices, such as Principle of Least Privilege, Just-In-Time Access, Secret Management, etc. thus minimizing attack surface, enhancing operational excellence, and achieving compliance.
Sudheer Karanam brings over 19 years of experience in the IT Industry with over 12 years dedicated to InfoSec. His expertise includes many Information security domains such as User Profile Management, Personally Identifiable Information, Single Sign On, OAuth, OpenId, Device Identity, Risk Adaptable Access controls, Privileged Identity and Access Management, Secrets Management, and PCI (Payment Card Industry) standards & processes. He also holds security certifications such as Certified Ethical Hacker (CEH) and CISSP.
Agenda:
5:00 – Socializing/networking
5:05 – Announcements
5:10 – Presentation
There’s usually more time for networking after the talk as well.
Details
Organizer