Free online learning for government employees.

Protecting Identities: The Need for Privileged Access Management

One type of cyber vulnerability — identity security — is a particular concern as agencies increasingly transition to the cloud, expanding their attack surfaces, multiplying the number of user privileges, and augmenting system blind spots. In this video interview, Kevin E. Greene, Chief Security Strategist for Public Sector at BeyondTrust, discusses how privileged access management (PAM) can keep malicious actors at bay.

Download

Related Videos