Privileged Access Management in the Cloud – the Forgotten Necessity

May 20, 09.00–10.15 CET · Free Webinar · In English

Register here

Welcome to a webinar with focus on practical security in a world of public and hybrid clouds.

Cloud migrations are hard enough, without considering sophisticated identity and access management. But it is functionality that needs to be taken care of by a security minded organization. That’s obvious in a world full of cyber criminals. Unfortunately, adequate identity and access management is often forgotten during cloud migrations, and if remembered it can be difficult to find solutions that are flexible enough to work both on-prem and on public clouds, not to mention in hybrid environments.

This is especially clear when it comes to privileged access management (PAM). The function of PAM is to restrict access to valuable resources only to the users, applications, servers, microservices, IoT devices, and other resources that should have access, and to the absolute minimum necessary to perform legitimate tasks.

Computer Sweden/Computerworld and IBM invite everybody with the need of PAM in modern IT environments to 75 informative minutes. During the event you will hear experts describe strategies, solutions, and operations for PAM in all relevant IT environments, with extra focus on the cloud.

In accordance with the time we live in, PAM for remote workers will be covered. Also, special care will be taken of describing challenges in machine-to-machine communication. And there will be time to dissect how to deal with common problems, like several people sharing a sensitive administrator account. Last, but certainly not least, the increasing need of governing access rights for developers in the modern world of DevOps and continuous delivery will be discussed.

There will be more information about:

  • Security threats – the need to protect data, users, and equipment
  • Flexibility – designing a PAM solution up-front for the hybrid cloud scenario is a necessity for protecting modern environments and workloads
  • The cloud – how to integrate PAM for on-prem and cloud resources
  • Solutions – the architecture and parts of a modern PAM solution
  • Implementation – how to go about it, and how to manage operations
  • Practical use cases – examples from the real world, of solving real problems

I want to attend the webinar

This webinar is free of charge – for CISOs, CSOs, IT Managers, IT Directors, Heads of IT Security, Heads of IT and people in equivalent roles. If you would like to attend, register your interest through the form below, and we will get back to you shortly. Attendance is limited, and Computer Sweden/Computerworld and IBM reserve the right to deny applications from outside the target audience or from competitors.

  • Register Here

  • Remember your country prefix: +45/+46/etc. Used for reminder via text message
  • IBM may use my contact data to keep me up-do-date about products, services and offerings:
  • You can withdraw your marketing consent at any time here: (opt-out request). Also you may unsubscribe from receiving marketing emails by clicking the unsubscribe link in each such email. More information on our processing can be found in the IBM Privacy Statement. By submitting this form, I acknowledge that I have read and understand the IBM Privacy Statement.
  • Detta fält används för valideringsändamål och ska lämnas oförändrat.

Speakers

Agenda

Language for this webinar: English.

  • 09.00: Welcome!
  • Improve your Zero Trust strategy with PAM
    Magnus Wennergren, Competency Lead, Identity and Access Management, IBM
  • Why PAM is so important for hybrid multi-cloud enviroments
    Magnus Wennergren, Competency Lead, Identity and Access Management, IBM
  • What are the most common use cases for PAM in the cloud?
    Nagendra Barla, Executive Architect, European IAM CoC, IBM
  • Roll-out and deployment best practices
    Nagendra Barla, Executive Architect, European IAM CoC, IBM
  • Q&A with all speakers
  • 10.15: Thanks for joining!

Computer Sweden and IBM welcomes everyone.

Henrik Nelin

Senior IT Security Architect, IBM Security

Magnus Wennergren

Competency Lead, Identity and Access Management, IBM

Nagendra Barla

Executive Architect, European IAM CoC, IBM

Nagendra Barla

Executive Architect, European IAM CoC, IBM

Magnus Wennergren

Competency Lead, Identity and Access Management, IBM

Nagendra Barla

Executive Architect, European IAM CoC, IBM

Henrik Nelin

Senior IT Security Architect, IBM Securit

Contact Us

Christine Karlsson
Project Manager
070-265 67 88
christine.karlsson@idg.se

Cecilie Thoresen
Nordic Event Manager, Security, IBM
+47 932 64630
cecilie.tho@ibm.com