Access Management , Privileged Access Management , Security Operations

Privileged Access Management: The New Mandate

Chad Carter of Wallix Group on Managing and Monitoring Privileged Access
Chad Carter, vice president of sales, Wallix Group

The explosion in the quantity and diversity of internet-connected devices - from industrial control systems and cars to farming equipment and refrigerators - makes applying privileged access management more important than ever, says Wallix Group's Chad Carter.

See Also: Conversational Cyber Insurance: How Cybersecurity and Cyber Insurance are Interwined

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Carter discusses:

  • Some of the top PAM vulnerabilities that are commonly overlooked in this era of connected devices;
  • Challenges faced by specific industries;
  • Best practice recommendations for managing and monitoring privileged access;
  • How Wallix distinguishes itself in this PAM space.

Carter is vice president of sales at Wallix. He has 25 years of experience in IT. He previously has worked for hardware and software companies, providing network and security solutions.

About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.