Why You Need Privileged Access Management – for employees and 3rd parties - As Part Of Your IT Security Strategy

Wednesday, June 29th, 2022 | 12:00 PM - 1:00 PM CT

When it comes to strong cybersecurity architecture and threat management, both internal and external access to your organization’s systems are key areas to restrict and monitor for IT security vulnerabilities. During this informative discussion, we will dive into the critical reasons why you should include both privileged access management (PAM), and a third-party remote access working in tandem as part of your cybersecurity architecture. You’ll also learn how access management (both internal and external) — including fine-grained access controls and thorough access auditing— is now required as part of regulatory and compliance frameworks, such as CCPA and GDPR.
  • Benefits of integrating third-party remote access with internal privileged access management
  • Access management compliance requirements
  • Security best practices to mitigate internal and third-party risk


Jesse Myers 1 - Cierra Levy

Jesse Myers

VP IT & Security, Imprivata


Joel Burleson-Davis

Chief Technology Officer, SecureLink

Chris Akeroyd

Chris Akeroyd

Senior Vice President and Chief Information Officer, Children's Health

Brian Herr Square

Brian Herr

Chief Security Officer, Coretek

Screenshot 2022-06-29 at 12.11.12 AM

Brian Barnes

Chief Technology Officer, Coretek