Chris Owen

Chris is currently responsible for helping to drive Saviynt’s product innovation, roadmap, go-to-market messaging and competitive intelligence. He has acquired a wealth of experience in Identity & Access Management (IAM) and Privileged Access Management (PAM) over a 15-year career in various technical and leadership roles at Quest / One Identity, CyberArk, BeyondTrust and Centrify. Chris began his career as a technical lead of one of the largest transformation projects in Europe at that time.

Posts by Chris Owen:

The three Ms of Privileged Access Management

As a result of the rise in cloud adoption across organisations, the threat landscape has expanded, with cybercriminals taking advantage of any weaknesses in an increasingly growing attack surface. One of the most commonly used components in an attack today is the use of compromised credentials, in which bad actors exploit weak passwords, bugs and misconfigurations to gain access to sensitive and valuable information or system controls in what are known as ‘privilege escalation’ attacks.
Incorporating least-privilege principles and just-in-time access is an essential element of any cloud-PAM approach. It ensures end users receive the right level of privilege for their immediate tasks, no matter where they’re working or what device, network or platform they’re using – protecting critical assets and data from prying eyes.

Mitigating human error security risks

Human error is a mounting concern in cybersecurity and organisations are wising up to the extent of this threat. To err is human, but it is important to remember that employees build businesses and contribute to their long-term growth and success. Rather than place the onus on them to be cyber aware, they require education about the risks they could face.

How to reduce third-party access risk

With organisations across the globe facing unprecedented skills shortages, and with the world of work still recovering after the disruption of the pandemic, it is not uncommon for companies to look externally to third-party vendors for support. And as the integration of third-party vendors grows – including contractors and freelancers, as well as automated bots and other non-employee services – it is vital that organisations take a proactive step to addressing and applying a third-party access governance programme. By following these five steps, while there is more to be done, companies are on their way to being able to confidently retain third-party services, reduce risk across their IT environments, wherever teams are working, and be able to effectively manage and gain visibility over all identities in their system.