This breakout serves not just as an introduction but is also ideal for those who already have a PAM program and are looking to mature it. The following topics are covered: why is PAM such a crucial piece of any security program? How should you leverage PAM? How can you raise your security posture by using a just-in-time PAM and zero standing privileges approach?