• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home People Culture and Behaviour

PodChats for FutureCISO: Modernising PAM strategies for a security-first world

allantan by allantan
November 12, 2024
PodChats for FutureCISO: Modernising PAM strategies for a security-first world

PodChats for FutureCISO: Modernising PAM strategies for a security-first world

Share on FacebookShare on Twitter

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands, which are used to administer or configure systems and applications.

Available as software, SaaS or hardware appliances, PAM tools manage privileged access for both people (system administrators and others) and machines (systems or applications).

It is widely expected that in 2025, PAM will be shaped by advancements in artificial intelligence, machine learning, and automation, enabling more proactive and adaptive security measures. As regulatory compliance becomes more stringent across various industries in Asia, organisations will be compelled to adopt robust PAM solutions to safeguard sensitive data and ensure accountability.

The convergence of hybrid work environments and cloud technologies will also necessitate re-evaluating PAM strategies, emphasising the need for flexible yet secure access controls.

Evolution of PAM tools and strategies

Phil Calvin, chief product officer for Delinea, emphasises that the evolution of PAM tools and strategies has been significantly influenced by the rise of hybrid work and cloud technologies. As organisations increasingly adopt cloud-based identities and workloads, the concept of privilege has transformed.

"The infrastructure that’s running in the back office is now literally everywhere; every account and every interaction is privileged," he elaborates. This shift necessitates that PAM solutions broaden their scope to effectively manage these dispersed privileges.

Practical applications of AI, ML, and Automation in PAM

As organisations begin to integrate artificial intelligence (AI), machine learning (ML), and automation into their PAM strategies, Calvin highlights practical applications that have emerged. For instance, Delinea’s PAM products can record user sessions during privileged activities and apply AI to detect anomalies. This capability allows security teams to focus on critical moments rather than sifting through hours of footage, thus enhancing efficiency and responsiveness.

Responsible AI integration in PAM solutions

The adoption of AI brings with it critical considerations regarding data privacy and vendor responsibility. Calvin suggests organisations ask their vendors about how AI is being used, ensuring that data is not shared indiscriminately and that proper governance is in place.

He insists that there is transparency in AI deployment citing this as essential.

Related:  Fraud-as-a-Service: The dark side of digital entrepreneurship

Measuring PAM effectiveness

He acknowledges that metrics for measuring the effectiveness of PAM solutions are also evolving and advises that uptime and user experience should be prioritised. A PAM solution must operate seamlessly to avoid user workarounds, which can undermine security.

Calvin emphasises the importance of maintaining high-reliability standards, noting that the software should not impede day-to-day operations for system administrators.

Ensuring compliance with regional regulations

In regions like Asia, where regulatory compliance is increasingly stringent, Calvin stresses the importance of transparency and regional data management.

“Organisations need to ensure that their cloud deployments adhere to local regulations, which can vary significantly. This compliance is crucial in maintaining trust and safeguarding sensitive information.” Phil Calvin

Importance of scalability of PAM solutions

As organisations grow or scale back, the scalability of PAM solutions becomes vital. Calvin underscores the need for CISOs to thoroughly evaluate how PAM software is built to ensure it can adapt to changing organisational needs.

He adds that a robust PAM solution should maintain performance under various conditions, ensuring reliable service as business requirements evolve.

Zero Trust in PAM strategies

Calvin does not discount the contribution of Zero Trust in modern PAM strategies. He explains that authorisation must be dynamic, allowing for the temporary elevation of privileges based on specific conditions.

“This approach aligns with the Zero Trust model, which assumes that no user should have inherent trust and that privileges must be granted explicitly and contextually,” he explains.

Leverage identity governance to strengthen PAM

Calvin stresses that governance plays a crucial role in strengthening PAM initiatives. He introduces the idea of "identity drift," where users may retain privileges they no longer need, potentially leading to security risks.

“By implementing governance solutions, organisations can mitigate this drift, ensuring that access rights are continuously monitored and adjusted as necessary,” he continues.

Future trends for PAM in 2025

Looking ahead, Calvin envisions a future where PAM solutions become increasingly dynamic, aided by AI-driven policy enforcement. He opines that this evolution will enable organisations to respond to security challenges more proactively and effectively.

Related:  Treat cybersecurity as a business decision

“As cyber threats continue to advance, the role of PAM will be critical in safeguarding sensitive data and ensuring accountability in a complex, hybrid work environment,” he concludes.

Conclusion

The future of Privileged Access Management in 2025 will be marked by a convergence of advanced technologies, regulatory pressures, and an ever-evolving threat landscape. Organisations must adapt their PAM strategies to ensure robust security measures, enhance user experience, and maintain compliance, all while leveraging the capabilities of AI and automation to stay ahead in the security race.

Phil Calvin

“The nature of building a modern platform allows us to experiment with ways to make security better continuously. The adversaries are continuously devising better ways to defeat security. Our job is to stay ahead and help our customers sleep at night because we're there, and we're on it. We're on the identity security train with them.” Phil Calvin

Click on the PodChats player to hear Calvin share his views on some of the approaches CISOs can take when modernising PAM strategies for a security-first world.

  1. How have PAM tools and strategies evolved in the last two years following hybrid work, the shift to cloud, and more recently the heightened interest in AI, ML and automation?
  2. For those that have already started to embed AI, ML and automation into their PAM strategies, what has worked and not worked?
  3. Any lessons learned when it comes to integrating AI and ML into existing PAM implementations?
  4. What metrics should CISOs use to measure the effectiveness of their PAM solutions and practices?
  5. Given the heightened interest around data privacy and protection, but disparate guidelines and frameworks, what steps should CISOs/enterprises take to ensure compliance with regional regulations concerning privileged access?
  6. How can CISOs ensure that their PAM solutions are scalable as the organisation grows?
  7. What role does zero-trust play in PAM strategies and how do you see zero trust evolving in 2025 concerning PAM implementations?
  8. How do you see enterprises leveraging identity governance to strengthen their PAM initiatives?
  9. Our topic is modernising PAM strategies for a security-first world, what’s in store for Privilege Access Management in 2025?
Tags: DelineaGartnerPAMPodchatsprivileged access management
allantan

allantan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • DDoS attacks surge in Asia Pacific, claims Cloudflare
  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl