CXOInsights by CXOCIETY

PodChats for FutureCISO: Modernising PAM strategies for a security-first world

CXOCIETY | FutureCIO FutureCFO FutureIoT Season 5

Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands used to administer or configure systems and applications. 

Available as software, SaaS or hardware appliances, PAM tools manage privileged access for both people (system administrators and others) and machines (systems or applications). 

Gartner defines four distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, and cloud infrastructure entitlement management (CIEM).

It is widely expected that in 2025, PAM will be shaped by advancements in artificial intelligence, machine learning, and automation, enabling more proactive and adaptive security measures. As regulatory compliance becomes more stringent across various industries in Asia, organizations will be compelled to adopt robust PAM solutions to safeguard sensitive data and ensure accountability. The convergence of hybrid work environments and cloud technologies will also necessitate re-evaluating PAM strategies, emphasizing the need for flexible yet secure access controls.

In this PodChats for FutureCISO, Phil Calvin, Chief Product Officer, Delinea, shares his views on some of CISOs' approaches when modernising PAM strategies for a security-first world.

1.       How have PAM tools and strategies evolved in the last two years following hybrid work, the shift to the cloud, and more recently the heightened interest in AI, ML and automation?

2.       For those that have already started to embed AI, ML and automation into their PAM strategies, what has worked and not worked?

3.       Any lessons learned when it comes to integration AI and ML into existing PAM implementations?

4.       What metrics should CISOs use to measure the effectiveness of their PAM solutions and practices?

5.       Given the heightened interest around data privacy and protection, but disparate guidelines and frameworks, what steps should CISOs/enterprises take to ensure compliance with regional regulations concerning privileged access? 

6.       How can CISOs ensure that their PAM solutions are scalable as the organization grows?

7.       What role does zero-trust play in PAM strategies and how do you see zero trust evolving in 2025 to PAM implementations?

8.       How do you see enterprises leveraging identity governance to strengthen their PAM initiatives? 

9.       Our topic is modernising PAM strategies for a security-first world, what’s in store for Privilege Access Management in 2025?