Access Management , Global Compliance , Identity & Access Management

Tools and Skills to Improve Privileged Access Management

Ken Ammon of CA Technologies on How to Avoid Being the Next Breach Headline

The keys to the digital kingdom are too easy to steal through malware and social engineering. What can security leaders do to help raise their organizations' level of privileged access management? Ken Ammon of CA Technologies offers insights.

See Also: Unlock the Power of Privileged Account Management (PAM) Policies

In a video interview at RSA Conference 2016, Ammon discusses:

  • Common privileged access security gaps;
  • Technical and non-technical obstacles to improving PAM;
  • CA's PAM solutions and how customers respond to them.

Ammon is a senior adviser to CA Technologies. A recognized expert in security issues, he formerly was with Xceedium, which was acquired by CA. Previously, he worked at Lookingglass Security, a consulting firm that advises corporations and private equity funds on emerging security trends and technologies. Ammon also was founder and president of NetSec, a leading managed security service provider. After selling NetSec to Verizon Business Systems, he became a senior vice president with the communications and IT-solutions giant.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.