{"id":49840,"date":"2024-11-15T04:47:18","date_gmt":"2024-11-15T11:47:18","guid":{"rendered":"https:\/\/www.syteca.com\/?p=49840"},"modified":"2024-11-15T06:12:13","modified_gmt":"2024-11-15T13:12:13","slug":"webinar-pam-roadmap","status":"publish","type":"post","link":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap","title":{"rendered":"From Theory to Practice: Webinar on Access Management Essentials"},"content":{"rendered":"\n<p>Implementing privileged access management (PAM) is crucial in safeguarding your organization\u2019s critical systems and sensitive data against unauthorized access and compromise. Join us for an in-depth look at effective PAM strategies with our cybersecurity experts Jonathan Care and Aleksandr Dymov.<\/p>\n\n\n\n<p>This webinar will guide you through essential PAM practices for securing critical assets and minimizing security risks across your organization. You\u2019ll also see a demo of the Syteca platform\u2019s capabilities and get your questions answered.<\/p>\n\n\n\n\t\t<div  class=\"block-0e22dd25-0290-483b-ad72-0c8c212b5bf0 areoi-element container template-6 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-37fc02c7-746a-465e-abe7-28927007288e areoi-element p-3 table-head\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\"><strong>Webinar details<\/strong><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1d5d6159-c6da-417f-b1d6-cf433c1fb495 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5ddb4ab0-cc83-40b6-863f-a9857000a57d row areoi-element row-cols-1 row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-827b4d90-706b-4090-a343-7ed959e9ddbf col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:500\">Topic<br><strong><strong>PAM Roadmap: Key Strategies for Effective Access Control<\/strong><\/strong><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af6987dc-0ef5-413e-9f98-04085ef6ca68 col areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(55, 84, 115,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:500\">Time<br><strong><strong>November 21, 2024<\/strong><\/strong><br><strong><strong>12 PM (EST) \/ 6 PM (CET)<\/strong><\/strong><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-28b3d633-1691-4973-8d7b-d2c1838773fc row areoi-element row-cols-1 row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-1765243f-d41b-4e37-8d4d-7c7bde2c1da0 col areoi-element col-12 col-sm-12 col-md-12 col-lg-12 col-xl-12 col-xxl-12\">\n\t\t\t\n\t\t<div class=\"areoi-background  d-none d-sm-none d-md-block\">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(55, 84, 115,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-4\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/events.teams.microsoft.com\/event\/a2098a0a-0651-4adc-9106-9998de6445bd@880168e8-2578-4d2b-9d2e-16a82dfe9a79\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Register now<\/strong><\/a><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading\">About speakers<\/h2>\n\n\n\n\t\t<div  class=\"block-0a9bc8d4-ce6c-4e98-9ff3-b5dd02cd3579 areoi-element container template-9 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ef787d56-db0f-4e04-a3ce-8cd603338514 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5ddb4ab0-cc83-40b6-863f-a9857000a57d row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-827b4d90-706b-4090-a343-7ed959e9ddbf col areoi-element p-2 col-12 col-md-3\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 p-poppins\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.linkedin.com\/in\/computercrime\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Jonathan Care<\/strong><\/a><\/p>\n\n\n\n<p><em>Cybersecurity Expert, Former Gartner Analyst<\/em><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af6987dc-0ef5-413e-9f98-04085ef6ca68 col areoi-element p-2 col-12 col-md-9\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-left mb-0\" style=\"font-style:normal;font-weight:400\">Jonathan Care is a seasoned cybersecurity and fraud detection expert and a former top Gartner analyst. He participated in defining the fraud detection and prevention market, led Gartner&#8217;s research on insider threats, and consulted industry leaders globally.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5ddb4ab0-cc83-40b6-863f-a9857000a57d row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-827b4d90-706b-4090-a343-7ed959e9ddbf col areoi-element p-2 col-12 col-md-3\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 p-poppins\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.linkedin.com\/in\/alex-dymov-426579182\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Aleksandr Dymov<\/strong><\/a><\/p>\n\n\n\n<p><em>Technical Product Manager at Syteca Inc.<\/em><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af6987dc-0ef5-413e-9f98-04085ef6ca68 col areoi-element p-2 col-12 col-md-9\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-left mb-0\" style=\"font-style:normal;font-weight:400\">Aleksandr Dymov drives innovation at Syteca, managing every stage from R&amp;D to product release. He plays a pivotal role in developing features that significantly enhance the Syteca platform, such as account discovery and workforce password management.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading\">What\u2019s the webinar about?<\/h2>\n\n\n\n<p>Jonathan Care will discuss the key strategies for effective access management. He\u2019ll explore the best practices for protecting your organization\u2019s critical assets and minimizing security risks.<\/p>\n\n\n\n<p>Alexandr Dymov will provide valuable insights on managing the challenges of securing privileged accounts based on his experience in implementing PAM solutions. He will also examine some recent case studies and highlight their key takeaways.<\/p>\n\n\n\n\t\t<div  class=\"block-5fe17698-1d86-48fc-b951-f9ac29ef09a2 areoi-element container template-15 mx-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center text-26-22 p-poppins\" style=\"font-style:normal;font-weight:600\">Webinar topics<\/p>\n\n\n\n\t\t<div  class=\"block-4443d67f-11c5-4086-8a5e-1651f0838ef2 row areoi-element pt-3 row-cols-1\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-00293862-de68-4439-86cc-012eaa67310c col areoi-element p-4 mb-4 d-flex align-items-center rounded-13 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-3 mb-0 rounded-13 has-text-color has-background\" style=\"color:#fefdfd;background-color:#4790ea;font-size:2rem\">1<\/p>\n\n\n\n<p class=\"p-poppins mb-0 ps-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:600\">Securing business IT infrastructures with PAM<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-94d314aa-cecc-4a64-bb45-3b08a63d9419 col areoi-element p-4 mb-4 d-flex align-items-center rounded-13 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-3 mb-0 rounded-13 has-text-color has-background\" style=\"color:#fefdfd;background-color:#4790ea;font-size:2rem\">2<\/p>\n\n\n\n<p class=\"p-poppins mb-0 ps-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:600\">Key strategies for effective access control<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-00293862-de68-4439-86cc-012eaa67310c col areoi-element p-4 mb-4 d-flex align-items-center rounded-13 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-3 mb-0 rounded-13 has-text-color has-background\" style=\"color:#fefdfd;background-color:#4790ea;font-size:2rem\">3<\/p>\n\n\n\n<p class=\"p-poppins mb-0 ps-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:600\">Meeting IT compliance requirements<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5587cb8f-1f24-4e48-8c3e-2cf06bb5f64a col areoi-element p-4 mb-4 d-flex align-items-center rounded-13 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"p-3 mb-0 rounded-13 has-text-color has-background\" style=\"color:#fefdfd;background-color:#4790ea;font-size:2rem\">4<\/p>\n\n\n\n<p class=\"p-poppins mb-0 ps-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:600\">Live demo of Syteca PAM <\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p>During the webinar you\u2019ll have the chance to ask our experts questions about the Syteca platform and cybersecurity in general.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">The ultimate in privileged access management with Syteca<\/h2>\n\n\n\n<p>Syteca is a comprehensive cybersecurity platform that protects your organization&#8217;s inside perimeter from human-related threats. Syteca PAM combines multiple capabilities to ensure all-around protection of your critical assets including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"mb-2\"><a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">Identity management<\/a>. Securely authenticate users and verify their identities to prevent unauthorized access.<\/li>\n\n\n\n<li class=\"mb-2\"><a href=\"\/en\/solutions\/privileged-user-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Privileged user management<\/a>. Granularly grant access to your critical endpoints and monitor privileged user activity to minimize security risks.<\/li>\n\n\n\n<li class=\"mb-2\"><a href=\"\/en\/product\/privileged-account-discovery\" target=\"_blank\" rel=\"noreferrer noopener\">Privileged account discovery<\/a>. Mitigate security blindspots by detecting and taking control of unmanaged privileged accounts.<\/li>\n\n\n\n<li><a href=\"\/en\/product\/workforce-password-management\" target=\"_blank\" rel=\"noreferrer noopener\">Workforce password management<\/a>. Securely store, rotate, and share passwords within your teams.<\/li>\n<\/ul>\n\n\n\n<p>Armed with Syteca&#8217;s rich set of features, you can leverage the platform to meet multiple requirements of <a href=\"\/en\/solutions\/meeting-compliance-requirements\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity standards, laws, and regulations<\/a>, including the <a href=\"\/en\/solutions\/meeting-compliance-requirements\/gdpr-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a>, <a href=\"\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a>, <a href=\"\/en\/solutions\/meeting-compliance-requirements\/hipaa-compliance-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">HIPAA<\/a>, <a href=\"\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">DORA<\/a>, <a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-800-171-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-171<\/a>, and <a href=\"\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large mb-0\"><img decoding=\"async\" width=\"825\" height=\"313\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051032\/figure-1-webinar-PAM-roadmap.svg\" alt=\"Image - Syteca is recognized by cybersecurity experts\" class=\"wp-image-49847\"\/><\/figure>\n\n\n\n<h2  class=\"wp-block-heading mt-0\">Register for the webinar today!<\/h2>\n\n\n\n<p>Secure your spot now and learn strategies for privileged access management to strengthen your organization\u2019s security posture. Don\u2019t miss out \u2014 <a href=\"https:\/\/events.teams.microsoft.com\/event\/a2098a0a-0651-4adc-9106-9998de6445bd@880168e8-2578-4d2b-9d2e-16a82dfe9a79\" target=\"_blank\" rel=\"noreferrer noopener\">join our live webinar<\/a> on November 21st for insights that will transform your approach to cybersecurity.<\/p>\n\n\n\n<p><a href=\"\/en\/blog\" target=\"_blank\" rel=\"noreferrer noopener\">Visit our blog<\/a> for more expert tips on access management and data protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Implementing privileged access management (PAM) is crucial in safeguarding your organization\u2019s critical systems and sensitive data against unauthorized access and compromise. Join us for an in-depth look at effective PAM strategies with our cybersecurity experts Jonathan Care and Aleksandr Dymov. This webinar will guide you through essential PAM practices for securing critical assets and minimizing [&hellip;]<\/p>\n","protected":false},"author":41,"featured_media":49854,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[61],"tags":[],"class_list":["post-49840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Webinar on Privileged Access Management | Syteca<\/title>\n<meta name=\"description\" content=\"Join our insightful webinar led by industry experts and master how to manage privileged access for enhanced security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar on Privileged Access Management | Syteca\" \/>\n<meta property=\"og:description\" content=\"Join our insightful webinar led by industry experts and master how to manage privileged access for enhanced security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-15T11:47:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-15T13:12:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051156\/OG-banner-webinar-PAM-roadmap.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Helen Gamasenko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Helen Gamasenko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap\"},\"author\":{\"name\":\"Helen Gamasenko\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad\"},\"headline\":\"From Theory to Practice: Webinar on Access Management Essentials\",\"datePublished\":\"2024-11-15T11:47:18+00:00\",\"dateModified\":\"2024-11-15T13:12:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap\"},\"wordCount\":497,\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051134\/banner-webinar-PAM-roadmap.png\",\"articleSection\":[\"Company News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap\",\"url\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap\",\"name\":\"Webinar on Privileged Access Management | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051134\/banner-webinar-PAM-roadmap.png\",\"datePublished\":\"2024-11-15T11:47:18+00:00\",\"dateModified\":\"2024-11-15T13:12:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad\"},\"description\":\"Join our insightful webinar led by industry experts and master how to manage privileged access for enhanced security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051134\/banner-webinar-PAM-roadmap.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051134\/banner-webinar-PAM-roadmap.png\",\"width\":1920,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Company News\",\"item\":\"https:\/\/www.syteca.com\/en\/blog\/category\/company-news\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Theory to Practice: Webinar on Access Management Essentials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad\",\"name\":\"Helen Gamasenko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111320\/Helen.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111320\/Helen.png\",\"caption\":\"Helen Gamasenko\"},\"description\":\"Helen is a Chief Marketing Officer at Syteca. She builds marketing and brand development strategies that make Syteca known around the globe. Elena is an effective manager who helps our experts to prepare for conferences, simultaneously coordinates the marketing team in running PR campaigns, partner marketing projects and Syteca\u2019s brand awareness growth.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/elena-gamasenko-24415aa3\/\"],\"url\":\"https:\/\/www.syteca.com\/en\/blog\/author\/helen-gamasenko\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webinar on Privileged Access Management | Syteca","description":"Join our insightful webinar led by industry experts and master how to manage privileged access for enhanced security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap","og_locale":"en_US","og_type":"article","og_title":"Webinar on Privileged Access Management | Syteca","og_description":"Join our insightful webinar led by industry experts and master how to manage privileged access for enhanced security.","og_url":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap","og_site_name":"Syteca","article_published_time":"2024-11-15T11:47:18+00:00","article_modified_time":"2024-11-15T13:12:13+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051156\/OG-banner-webinar-PAM-roadmap.png","type":"image\/png"}],"author":"Helen Gamasenko","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Helen Gamasenko","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#article","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap"},"author":{"name":"Helen Gamasenko","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad"},"headline":"From Theory to Practice: Webinar on Access Management Essentials","datePublished":"2024-11-15T11:47:18+00:00","dateModified":"2024-11-15T13:12:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap"},"wordCount":497,"image":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051134\/banner-webinar-PAM-roadmap.png","articleSection":["Company News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap","url":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap","name":"Webinar on Privileged Access Management | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051134\/banner-webinar-PAM-roadmap.png","datePublished":"2024-11-15T11:47:18+00:00","dateModified":"2024-11-15T13:12:13+00:00","author":{"@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad"},"description":"Join our insightful webinar led by industry experts and master how to manage privileged access for enhanced security.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051134\/banner-webinar-PAM-roadmap.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/15051134\/banner-webinar-PAM-roadmap.png","width":1920,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-pam-roadmap#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Company News","item":"https:\/\/www.syteca.com\/en\/blog\/category\/company-news"},{"@type":"ListItem","position":2,"name":"From Theory to Practice: Webinar on Access Management Essentials"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad","name":"Helen Gamasenko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111320\/Helen.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111320\/Helen.png","caption":"Helen Gamasenko"},"description":"Helen is a Chief Marketing Officer at Syteca. She builds marketing and brand development strategies that make Syteca known around the globe. Elena is an effective manager who helps our experts to prepare for conferences, simultaneously coordinates the marketing team in running PR campaigns, partner marketing projects and Syteca\u2019s brand awareness growth.","sameAs":["https:\/\/www.linkedin.com\/in\/elena-gamasenko-24415aa3\/"],"url":"https:\/\/www.syteca.com\/en\/blog\/author\/helen-gamasenko"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts\/49840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=49840"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts\/49840\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/49854"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=49840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/categories?post=49840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/tags?post=49840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}