Event address for attendees: https://catechnologies.webex.com/catechnologies/onstage/g.php?MTID=eb618c3ad328be3a1408fe06785b27782
Many data breaches happen because of compromises of privileged user accounts. Standards and
regulation bodies, as well as auditors, have recognized the risks associated with privileged users and have introduced regulatory changes and audit standards to mitigate these risks. To defend themselves, enterprises have adopted Privileged Access Management solutions to provide critical controls such as a credential vault, video session recording, application credential management and more. But what about securing privileged access to the Amazon AWS environment? AWS has its own unique challenges that require specific sets of controls.
PAM Controls need to be applied the entire hybrid enterprise, including IaaS platforms such as Amazon AWS. Please join CA Technologies on August 5th, 2016 to learn how CA Privileged Access Manager can protect your entire hybrid enterprise, including a particular focus on securing the Amazon AWS environment.
If you're seeing the time as 4:00PM above, that's because it's showing in GMT. If you login to this site, the event time will adjust to your local time zone. You can adjust your time zone in your community preferences.