Главная
Study mode:
on
1
What is PAM
2
Agenda
3
Recap
4
Good privileged access management
5
Why is PAM so challenging
6
How can Data Science help
7
Data Challenges
8
Practical Principles
9
Start Slow
10
Start Small
11
Business Critical Systems
12
Smart Inventory
13
PAM
14
Event logs
15
Define allowed access paths
16
Who owns the system
17
Whats a security team get
18
Art of the possible
19
Group permissions
20
Combining data
21
Multiple devices
22
Chaos of lines
23
Common PAM problems
24
Graph visualizations
25
Next steps
26
Take aways
27
Questions
Description:
Explore the intersection of data science and Privileged Access Management (PAM) in this 26-minute conference talk from BSidesLV 2018. Delve into the challenges of implementing effective PAM strategies and discover how data science techniques can be leveraged to enhance security measures. Learn about practical principles for PAM implementation, including starting slow and small, focusing on business-critical systems, and developing smart inventory practices. Examine the importance of event logs, defining allowed access paths, and determining system ownership. Gain insights into common PAM problems and innovative solutions, such as graph visualizations for complex permission structures. Acquire valuable takeaways to improve your organization's approach to privileged access management and data-driven security practices.

Can Data Science Deal With PAM?

BSidesLV
Add to list