Authentication , ID & Access Management , Technology

Tools and Skills to Improve Privileged Access Management

Ken Ammon of CA Technologies on How to Avoid Being the Next Breach Headline

The keys to the digital kingdom are too easy to steal through malware and social engineering. What can security leaders do to help raise their organizations' level of privileged access management? Ken Ammon of CA Technologies offers insights.

See Also: Secrets to a Simpler Security Incident Response

In a video interview at RSA Conference 2016, Ammon discusses:

  • Common privileged access security gaps;
  • Technical and non-technical obstacles to improving PAM;
  • CA's PAM solutions and how customers respond to them.

Ammon is a senior adviser to CA Technologies. A recognized expert in security issues, he formerly was with Xceedium, which was acquired by CA. Previously, he worked at Lookingglass Security, a consulting firm that advises corporations and private equity funds on emerging security trends and technologies. Ammon also was founder and president of NetSec, a leading managed security service provider. After selling NetSec to Verizon Business Systems, he became a senior vice president with the communications and IT-solutions giant.

About the Author

Tom Field

Tom Field

Vice President - Editorial, ISMG

Field is an award-winning journalist with over 30 years experience in newspapers, magazines, books, events and electronic media. A veteran community journalist with extensive business/technology and international reporting experience, Field joined ISMG in 2007 and currently oversees the editorial operations for all of ISMG's global media properties. An accomplished public speaker, Field has developed and moderated scores of podcasts, webcasts, roundtables and conferences, and he has appeared at RSA Conference and on various C-SPAN, The History Channel and Travel Channel television programs.

Around the Network