Digital Identity , Identity & Access Management , Security Operations

Digital Transformation: The Privileged Access Imperative

CyberArk's Adam Bosnian on Why the Digital Enterprise Requires More Stringent Access Controls
Digital Transformation: The Privileged Access Imperative
Adam Bosnian, CyberArk

As a security leaders, too often you are brought to the table after a digital transformation project has been initiated, so you are forced to take a reactive position. But Adam Bosnian of CyberArk sees an important, proactive role for security. And a good start is by ensuring privileged access management is a key component of transformation.

Bosnian, an executive vice president with CyberArk, acknowledges that privileged accounts have been a key focus of security leaders - and adversaries - for decades. But their importance increases in the age of transformation, as enterprises move to the cloud, embrace agility and the DevSecOps culture.

"If you don't manage privileged access upfront, as that [transformation] occurs," Bosnian says, "you may be creating a larger security debt while the organization is looking to save money and be more efficient."

In an interview about digital transformation and the role of PAM, Bosnian discusses:

  • Why PAM plays such a vital role;
  • How digital transformation challenges security leaders;
  • Re-evaluating the CISO's role in transformation.

Bosnian is the executive vice president of global business development at CyberArk. He is responsible for managing and expanding global strategic relationships with technology partners at CyberArk.

As an early member of the CyberArk management team, Bosnian led the industry to define the market for privileged account security and compliance and helped to secure CyberArk's leadership in the space. He brings to the table over 25 years of experience in the security industry, specifically in the areas of identity and access management and digitization of the enterprise. Bosnian holds a Bachelor of Science degree in Electrical Engineering from Worcester Polytechnic Institute.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.