Explore the intersection of data science and Privileged Access Management (PAM) in this 26-minute conference talk from BSidesLV 2018. Delve into the challenges of implementing effective PAM strategies and discover how data science techniques can be leveraged to enhance security measures. Learn about practical principles for PAM implementation, including starting slow and small, focusing on business-critical systems, and developing smart inventory practices. Examine the importance of event logs, defining allowed access paths, and determining system ownership. Gain insights into common PAM problems and innovative solutions, such as graph visualizations for complex permission structures. Acquire valuable takeaways to improve your organization's approach to privileged access management and data-driven security practices.