{"id":2040,"date":"2020-09-18T14:45:52","date_gmt":"2020-09-18T21:45:52","guid":{"rendered":"https:\/\/fr.gosec.net\/?p=665"},"modified":"2020-09-18T14:45:52","modified_gmt":"2020-09-18T21:45:52","slug":"guidance-to-a-well-defined-privileged-access-management-program","status":"publish","type":"post","link":"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/","title":{"rendered":"Guidance to a well defined Privileged Access Management Program"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.6.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.6.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb collapsed=\u00a0\u00bboff\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.6.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.6.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb]<a href=\"\/?page_id=854\">&lt;&lt; Back to Sessions<\/a>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb2_3,1_3&Prime; _builder_version=\u00a0\u00bb4.6.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_column type=\u00a0\u00bb2_3&Prime; _builder_version=\u00a0\u00bb4.6.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.6.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb]<\/p>\n<h2>Guidance to a well defined Privileged Access Management Program<\/h2>\n<p>We often see that the challenges associated with implementing a Privilege Access Management (PAM) program are not a result of a lack of technology.  In order to have a successful PAM program, you must complement the technology with a well-defined program. Using a prescriptive approach based on three guiding principles, this session will show you how to develop effective and mature privileged access management programs, and articulate the value of the work you\u2019re doing with privileged access management and why it\u2019s important. <\/p>\n<p><a href=\"\/speakers\/michael-harlev\/\">Learn more about Michael Harlev<\/a>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.6.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/fr.gosec.net\/wp-content\/uploads\/Michael_Harlev_GoSec2020-1024&#215;1024-1-1024&#215;1024.png\u00a0\u00bb alt=\u00a0\u00bbMichael Harlev\u00a0\u00bb title_text=\u00a0\u00bbMichael_Harlev_GoSec2020-1024&#215;1024-1&Prime; _builder_version=\u00a0\u00bb4.6.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We often see that the challenges associated with implementing a Privilege Access Management (PAM) program are not a result of a lack of technology.  In order to have a successful PAM program, you must complement the technology with a well-defined program. Using a prescriptive approach based on three guiding principles, this session will show you how to develop effective and mature privileged access management programs, and articulate the value of the work you\u2019re doing with privileged access management and why it\u2019s important. <\/p>\n<p><a href=\"\/speakers\/michael-harlev\/\">Learn more about Michael Harlev<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2040","post","type-post","status-publish","format-standard","hentry","category-partner-sessions"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Guidance to a well defined Privileged Access Management Program - GoSec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guidance to a well defined Privileged Access Management Program - GoSec\" \/>\n<meta property=\"og:description\" content=\"We often see that the challenges associated with implementing a Privilege Access Management (PAM) program are not a result of a lack of technology. In order to have a successful PAM program, you must complement the technology with a well-defined program. Using a prescriptive approach based on three guiding principles, this session will show you how to develop effective and mature privileged access management programs, and articulate the value of the work you\u2019re doing with privileged access management and why it\u2019s important. Learn more about Michael Harlev\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/\" \/>\n<meta property=\"og:site_name\" content=\"GoSec\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-18T21:45:52+00:00\" \/>\n<meta name=\"author\" content=\"GoSec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GoSec\" \/>\n<meta name=\"twitter:site\" content=\"@GoSec\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"GoSec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/blog\\\/2020\\\/09\\\/18\\\/guidance-to-a-well-defined-privileged-access-management-program\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/blog\\\/2020\\\/09\\\/18\\\/guidance-to-a-well-defined-privileged-access-management-program\\\/\"},\"author\":{\"name\":\"GoSec\",\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/#\\\/schema\\\/person\\\/597cc888d84847d4d4199e9a331e8cab\"},\"headline\":\"Guidance to a well defined Privileged Access Management Program\",\"datePublished\":\"2020-09-18T21:45:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/blog\\\/2020\\\/09\\\/18\\\/guidance-to-a-well-defined-privileged-access-management-program\\\/\"},\"wordCount\":247,\"publisher\":{\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/#organization\"},\"articleSection\":[\"Sessions - Partner\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/blog\\\/2020\\\/09\\\/18\\\/guidance-to-a-well-defined-privileged-access-management-program\\\/\",\"url\":\"https:\\\/\\\/gosec.net\\\/fr\\\/blog\\\/2020\\\/09\\\/18\\\/guidance-to-a-well-defined-privileged-access-management-program\\\/\",\"name\":\"Guidance to a well defined Privileged Access Management Program - GoSec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/#website\"},\"datePublished\":\"2020-09-18T21:45:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/blog\\\/2020\\\/09\\\/18\\\/guidance-to-a-well-defined-privileged-access-management-program\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/gosec.net\\\/fr\\\/blog\\\/2020\\\/09\\\/18\\\/guidance-to-a-well-defined-privileged-access-management-program\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/blog\\\/2020\\\/09\\\/18\\\/guidance-to-a-well-defined-privileged-access-management-program\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/gosec.net\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guidance to a well defined Privileged Access Management Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/gosec.net\\\/fr\\\/\",\"name\":\"GoSec\",\"description\":\"Together, let\u2019s inspire, educate, and shape the future of cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/gosec.net\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/#organization\",\"name\":\"GoSec\",\"url\":\"https:\\\/\\\/gosec.net\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/gosec.net\\\/wp-content\\\/uploads\\\/GoSec24-color.png\",\"contentUrl\":\"https:\\\/\\\/gosec.net\\\/wp-content\\\/uploads\\\/GoSec24-color.png\",\"width\":2000,\"height\":800,\"caption\":\"GoSec\"},\"image\":{\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/GoSec\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/gosec22-conference\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/gosec.net\\\/fr\\\/#\\\/schema\\\/person\\\/597cc888d84847d4d4199e9a331e8cab\",\"name\":\"GoSec\",\"sameAs\":[\"http:\\\/\\\/gosec.wpengine.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guidance to a well defined Privileged Access Management Program - GoSec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/","og_locale":"fr_FR","og_type":"article","og_title":"Guidance to a well defined Privileged Access Management Program - GoSec","og_description":"We often see that the challenges associated with implementing a Privilege Access Management (PAM) program are not a result of a lack of technology. In order to have a successful PAM program, you must complement the technology with a well-defined program. Using a prescriptive approach based on three guiding principles, this session will show you how to develop effective and mature privileged access management programs, and articulate the value of the work you\u2019re doing with privileged access management and why it\u2019s important. Learn more about Michael Harlev","og_url":"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/","og_site_name":"GoSec","article_published_time":"2020-09-18T21:45:52+00:00","author":"GoSec","twitter_card":"summary_large_image","twitter_creator":"@GoSec","twitter_site":"@GoSec","twitter_misc":{"\u00c9crit par":"GoSec","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/#article","isPartOf":{"@id":"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/"},"author":{"name":"GoSec","@id":"https:\/\/gosec.net\/fr\/#\/schema\/person\/597cc888d84847d4d4199e9a331e8cab"},"headline":"Guidance to a well defined Privileged Access Management Program","datePublished":"2020-09-18T21:45:52+00:00","mainEntityOfPage":{"@id":"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/"},"wordCount":247,"publisher":{"@id":"https:\/\/gosec.net\/fr\/#organization"},"articleSection":["Sessions - Partner"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/","url":"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/","name":"Guidance to a well defined Privileged Access Management Program - GoSec","isPartOf":{"@id":"https:\/\/gosec.net\/fr\/#website"},"datePublished":"2020-09-18T21:45:52+00:00","breadcrumb":{"@id":"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gosec.net\/fr\/blog\/2020\/09\/18\/guidance-to-a-well-defined-privileged-access-management-program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gosec.net\/fr\/"},{"@type":"ListItem","position":2,"name":"Guidance to a well defined Privileged Access Management Program"}]},{"@type":"WebSite","@id":"https:\/\/gosec.net\/fr\/#website","url":"https:\/\/gosec.net\/fr\/","name":"GoSec","description":"Together, let\u2019s inspire, educate, and shape the future of cybersecurity","publisher":{"@id":"https:\/\/gosec.net\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gosec.net\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/gosec.net\/fr\/#organization","name":"GoSec","url":"https:\/\/gosec.net\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/gosec.net\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/gosec.net\/wp-content\/uploads\/GoSec24-color.png","contentUrl":"https:\/\/gosec.net\/wp-content\/uploads\/GoSec24-color.png","width":2000,"height":800,"caption":"GoSec"},"image":{"@id":"https:\/\/gosec.net\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/GoSec","https:\/\/www.linkedin.com\/company\/gosec22-conference\/"]},{"@type":"Person","@id":"https:\/\/gosec.net\/fr\/#\/schema\/person\/597cc888d84847d4d4199e9a331e8cab","name":"GoSec","sameAs":["http:\/\/gosec.wpengine.com"]}]}},"_links":{"self":[{"href":"https:\/\/gosec.net\/fr\/wp-json\/wp\/v2\/posts\/2040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gosec.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gosec.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gosec.net\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gosec.net\/fr\/wp-json\/wp\/v2\/comments?post=2040"}],"version-history":[{"count":0,"href":"https:\/\/gosec.net\/fr\/wp-json\/wp\/v2\/posts\/2040\/revisions"}],"wp:attachment":[{"href":"https:\/\/gosec.net\/fr\/wp-json\/wp\/v2\/media?parent=2040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gosec.net\/fr\/wp-json\/wp\/v2\/categories?post=2040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gosec.net\/fr\/wp-json\/wp\/v2\/tags?post=2040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}