Identity & Access Management , Privileged Access Management , Security Operations
How to Implement PAM Across Multiple Companies
Gonz Gonzales, CISO of JG Summit Holdings, Discusses His PAM JourneyHow does a conglomerate implement privileged access management across multiple companies? What are some of the challenges, and how can you overcome them? Gonz Gonzales, the CISO at JG Summit Holdings, one of the largest conglomerates in the Philippines, shares his journey of PAM implementation across companies.
See Also: Core Elements of Modern Workforce Identity Security
"One of the challenges we had was that different companies had different identity providers. In terms of putting them together, what we did was to create a virtual directory so that everyone logs into that through their PAM credentials," Gonzales says. "This might looks cumbersome to many out there, however we felt that given our environment, it was easier for us to create another set of identity providers rather than adopt everybody else's."
In a video interview with Information Security Media Group, Gonzales also discusses:
- His process of PAM implementation across industries;
- The technological challenges of PAM implementation;
- Where to begin your PAM journey.
Gonzales has been in the IT industry for more than two decades and has spent the past 18 years in various cybersecurity roles. His professional function and personal advocacy converge in the field of information security. He is a member of various professional organizations and participates in security and privacy standards formation for the Government of the Philippines.