Access Management , Identity & Access Management , Next-Generation Technologies & Secure Development
Privileged Access Management: Critical Elements
Anuj Tewari of HCL Technologies on the Essential Steps to TakeA successful privileged access management program has many critical components, including single sign-on, password management and provisioning, and maintenance of privileged identity, says Anuj Tewari of HCL Technologies.
"Data life cycle management is critical in providing special privileges to users in accessing data," he says. "Given the complexity of protecting data on the cloud and the evolution of the shared model, and given the regulatory demands with the advent of GDPR [General Data Protection Regulation], it is critical for organizations to protect their perimeter while ensuring that they don't leave any room for accessing data by the unauthorized users."
In this interview at Information Security Media Group's recent Fraud and Breach Prevention Summit in Mumbai (see audio link below photo), Tewari discusses:
- Protecting identities in a cloud environment;
- Creating a structured PAM risk management program;
- Ensuring perimeter protection when implementing PAM.
Tewari is CISO at HCL Technologies, where he's responsible for proper protection of physical and technical assets. Previously, he was the head of cybersecurity practice for Asia, Middle East and Africa at CSC and worked with several other organizations, including IBM, GE and Convergys.