Access Management , Identity & Access Management , Incident & Breach Response

Making Privileged Access Manageable

CyberArk's Barak Feldman on a Phased Approach to Improving PAM

It's easy to draw a direct link between high-profile breaches and the compromise of user credentials. But it requires a phased approach to actually improve privileged access management, says Barak Feldman of CyberArk.

See Also: Shift From Perimeter-Based to Identity-Based Security

In a video interview at Information Security Media Group's recent Washington Fraud and Breach Prevention Summit, Feldman, national director for the privileged account security solution portfolio at CyberArk, discusses:

  • The link between breaches and access;
  • How to make privileged access management more manageable;
  • Where to start and who should lead a PAM initiative.

Feldman joined CyberArk in 2001 and has held several sales and technical roles. including managing the system engineering group in the Americas. He has more than 15 years of experience in designing and implementing security and compliance solutions at Fortune 500 companies and at various federal agencies. He has in-depth technical knowledge related to the most crucial areas of information security, including regulatory compliance, policy management and access management, specifically with the current threats surrounding privileged access to the highest-risk assets within the enterprise.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.