Four Common Pitfalls of a Privileged Access Management (PAM) Project

With insights from Matt Smith, Director of Cyber & Information Security at St James’s Place

Over a third of all identity-related breaches involve privileged accounts. To tackle this cybersecurity provision gap, increasingly businesses are choosing to undertake Privileged Access Management (PAM) projects.

Read now

We will always keep your information safe. We ask for the information contained in this form in exchange for a valuable resource. By sharing your information it will also ensure we are able to send you educational information in future that we think will be of real value to you. We will never send you information about our products and services by email, unless it has been specifically requested.

*We respect your privacy and personal data. By submitting your details and downloading our document you are accepting Turnkey Consulting's privacy policy which can be found here.

Meet your hosts

Team Card
Ed Davis
Managing Director APAC, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Simon Persin
Simon Persin
Global Practice Director, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Shane Kennedy
Shane Kennedy,
Business Development Specialist, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Robert Budic
Robert Budic
Managing Director, Australia, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Team Card
Ed Davis
Managing Director APAC, 
Turnkey Consulting
Simon Persin
Simon Persin
Global Practice Director, 
Turnkey Consulting
Shane Kennedy
Shane Kennedy,
Business Development Specialist, 
Turnkey Consulting
Robert Budic
Robert Budic
Managing Director, Australia, 
Turnkey Consulting
AdobeStock_152652081 (1)

Unfortunately, PAM projects, which form an important element of Identity & Access Management (IAM) strategies, are often hindered by oversights and mistakes which diminish their effectiveness, and in some cases stop the deployment altogether.

In this guide, we run through four common pitfalls businesses have to navigate to get PAM right. Plus, we've included first-hand insights on managing a successful PAM rollout from Matt Smith, Director of Cyber & Information Security at St James’s Place, as first discussed at our virtual event Risky Business 2022.

 

Specifically, we explore:

  • The importance of PAM projects
  • Four common pitfalls of PAM projects and how to mitigate them
  • First-hand insights from a successful PAM implementation
  • Tips to achieving a successful PAM rollout

Latest guides

Guide

Extending identity governance solutions to SAP: Building the business case

Guide

Four Common Pitfalls of a Privileged Access Management (PAM) Project

Guide

A Healthier Approach: The business case for IGA in the pharmaceutical sector