Breakout Session – The Hidden Weakness in Identity Security, Why Traditional PAM is No Longer Enough

Scott Hesford, Director of Solutions Engineering, APJ, BeyondTrust

Identity is now the number one attack vector. Attackers are bypassing outdated security controls, exploiting misconfigured identities, excessive permissions, and poor session management. Traditional PAM (Privileged Access Management) solutions weren’t designed for today’s dynamic, cloud-first environments.

A 2024 threat intelligence report found that credential-based attacks accounted for 38% of all data breaches—significantly more than phishing (17%) and exploits (16%). This shift highlights a growing risk for security teams: legacy PAM tools alone aren’t enough to stop identity-based threats.

The session will explore where the biggest gaps and challenges lay in today’s PAM and identity security strategies that include:

  • Legacy PAM solutions that don’t scale
  • Mismanaged permissions creating hidden risk
  • Fragmented identity controls
  • Session monitoring gaps

With identity now at the centre of the attack surface, organisations need a modern PAM approach that integrates with broader identity security strategies—ensuring access is continuously verified, monitored, and minimised.

This breakout session will bring together cybersecurity and IAM leaders to discuss:

  • Why is traditional PAM no longer enough?
  • How can organisations implement a defence-in-depth approach to identity security
  • How can privileged access be secured without slowing down the business?