Modern privileged access management in the cloud: What’s in, what’s out?

On-Demand Webcast|1 Hour

Since privileged access is usually the last link in the cyber kill chain, Privileged Access Management (PAM) has evolved in importance from simple password management to an essential cyber risk reduction imperative. 

Now is the time to redefine what it means to have a mature PAM program in today’s multi-cloud world. Nearly half of all data breaches happen in the cloud and 92% of organizations are currently hosting at least some of their IT environment in the cloud. That means the majority of all businesses today have experienced a breach and continue to be at risk. 

Join Saviynt for a conversation on what’s “in” and what’s “out” in a modern, cloud privileged access management program:

  • Out: user friction, overprovisioning, and rubber-stamping
  • In: agile processes, zero-standing privilege (ZSP), and risk-based decision making

Topics and Takeaways:

  • Gaps in traditional PAM tools and approaches
  • Why a modern program must include just-in-time (JIT) PAM
  • Quick wins on the road to JIT PAM and ZSP
  • How Identity Governance and Privileged Access Management are converging to reduce risks and enhance productivity



Chris Owen

Director of Product Management


Chris is a Director of Product Management at Saviynt where he drives product innovation, execution of the technology roadmap, and go-to-market strategies. He has more than 15 years of experience in the identity access management and privileged access management industry. Before Saviynt, Chris held various technical and leadership roles at Quest / One Identity, CyberArk, BeyondTrust, and Centrify.


Tom Spring

Editorial Director

CyberRisk Alliance