b'
If you can\'t see all the show notes (with images and links) head here:\\xa0https://cisoseries.com/defense-in-depth-privileged-access-management-pam/
Where does privileged access management (PAM) fit in the order of operations?
Check out this post and discussion and this one\\xa0for the basis of our conversation on this week\\u2019s episode co-hosted by me,\\xa0David Spark\\xa0(@dspark), the creator of\\xa0CISO Series\\xa0and\\xa0Allan Alford\\xa0(@AllanAlfordinTX), CISO at\\xa0Mitel.\\xa0Our sponsored guest for this episode is Tim Keeler, CEO and co-founder of Remediant.
Thanks to this week\\u2019s podcast sponsor, Remediant
Eighty one percent of cyberattacks utilize stolen administrative credentials. Yet, legacy enterprise password vaults solve only a fraction of the problem and are difficult to rollout.\\xa0Remediant\'s SecureONE takes a new approach to privileged access management: offering agent-less, vault-less, continuous detection and just-in-time-administration. Learn what\\xa0Remediant\\xa0can do in a half-day POC deployment.