Access Management , Global Compliance , Identity & Access Management

Privileged Access Management: The Hidden Obstacles

Alex Mosher of CA Technologies on How to Clear These Hurdles

Enterprise security leaders largely understand the business problems posed by a lack of privileged access management. But understanding and overcoming the obstacles to deploying a successful PAM rollout? That's the real challenge, says Alex Mosher of CA Technologies.

See Also: Live Webinar | Taking the Challenges Out of Identity Security

In a video interview recorded at ISMG's San Francisco Fraud and Breach Prevention Summit, Mosher discusses:

  • The technology challenges to PAM;
  • The business issues that often are overlooked:
  • How cloud complicates everything.

As global vice president of CA Technologies, Mosher is responsible for CA's cybersecurity strategy and go-to-market plan and execution. Working to align CA's cybersecurity solutions and portfolio with customer requirements and objectives, Mosher leads a team that works to develop and implement action plans that enable customers to take control of security, identities, access and information across platforms and devices. Mosher joined CA in 2007. As a 20-year information technology industry veteran, he has amassed hands-on experience in virtually every aspect of the business, including sales and marketing, development and deployment services.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.