Meeting Security Challenges Through Essential Eight-Compliant Privileged Access Management (PAM)

Conclusion:
Designating special access to select users to secure critical information and enterprise infrastructure remains one of the most important measures to prevent security breaches. However, a holistic, cyber security framework requires enough time to be set in place, leaving organisations highly vulnerable to exploits and attack vectors even with measures such as privileged access management (PAM). Therefore, enterprises need to undertake critical mitigation strategies such as the Essential Eight as a baseline when aiming for a more mature zero trust environment.

About The Advisor
Peter Sandilands
Peter Sandilands is an IBRS advisor who specialises in cyber security, risk and compliance. Peter has over 40 years’ experience in the IT industry with the last 20 years focused on security. He has spoken at conferences and industry briefings across Asia Pacific. Peter was instrumental in the introduction of Check Point Software to Australia, leading the operation for five years. Prior to that Peter was a key strategist in the broadening of Novell’s market across Asia Pacific. Since then he has spent nearly 10 years working for large Australian companies in banking, mining and transport delivering security strategy, security architecture and compliance assessments. Peter has also assisted overseas security vendors enter the Australian market with a focus on the strategic use of the products. As a casual academic at UTS for over 20 years, Peter lectured in network security, Cloud security and networking technologies. With his experience across vendors, channel and business, Peter brings a pragmatic approach to implementing and assessing cyber security. Peter has a Master's of Cyber Security from Charles Sturt University.