Authentication , ID & Access Management , Privileged Access Management

Tools and Skills to Improve Privileged Access Management

Ken Ammon of CA Technologies on How to Avoid Being the Next Breach Headline

The keys to the digital kingdom are too easy to steal through malware and social engineering. What can security leaders do to help raise their organizations' level of privileged access management? Ken Ammon of CA Technologies offers insights.

See Also: IoT is Happening Now: Are You Prepared?

In a video interview at RSA Conference 2016, Ammon discusses:

  • Common privileged access security gaps;
  • Technical and non-technical obstacles to improving PAM;
  • CA's PAM solutions and how customers respond to them.

Ammon is a senior adviser to CA Technologies. A recognized expert in security issues, he formerly was with Xceedium, which was acquired by CA. Previously, he worked at Lookingglass Security, a consulting firm that advises corporations and private equity funds on emerging security trends and technologies. Ammon also was founder and president of NetSec, a leading managed security service provider. After selling NetSec to Verizon Business Systems, he became a senior vice president with the communications and IT-solutions giant.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its diverse cadre of senior-level editors and reporters. He also helped to develop and lead ISMG's award-winning Summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network