Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Can Data Science Deal With PAM?

BSidesLV via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intersection of data science and Privileged Access Management (PAM) in this 26-minute conference talk from BSidesLV 2018. Delve into the challenges of implementing effective PAM strategies and discover how data science techniques can be leveraged to enhance security measures. Learn about practical principles for PAM implementation, including starting slow and small, focusing on business-critical systems, and developing smart inventory practices. Examine the importance of event logs, defining allowed access paths, and determining system ownership. Gain insights into common PAM problems and innovative solutions, such as graph visualizations for complex permission structures. Acquire valuable takeaways to improve your organization's approach to privileged access management and data-driven security practices.

Syllabus

What is PAM
Agenda
Recap
Good privileged access management
Why is PAM so challenging
How can Data Science help
Data Challenges
Practical Principles
Start Slow
Start Small
Business Critical Systems
Smart Inventory
PAM
Event logs
Define allowed access paths
Who owns the system
Whats a security team get
Art of the possible
Group permissions
Combining data
Multiple devices
Chaos of lines
Common PAM problems
Graph visualizations
Next steps
Take aways
Questions

Taught by

BSidesLV

Reviews

Start your review of Can Data Science Deal With PAM?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.