![Tracking the attacker's steps: Using PAM in your incident response toolkit](/images/events/hero/EventLanding-OI-Resilience-Virtual-PAM-Breakout-PG-69709_Event Landing Page Image 750 x 231px_120571.jpg)
![Tracking the attacker's steps: Using PAM in your incident response toolkit](/images/events/hero/EventLanding-OI-Resilience-Virtual-PAM-Breakout-PG-69709_Event Landing Page Image 750 x 231px_120571.jpg)
A modern PAM solution will help you catch attackers trying to impersonate your privileged users, but what happened before that alarm went off? How did the attacker get access? Learn how integration with a security orchestration and response (SOAR) platform can help you gain those insights.
Speakers
Shannon Mathers
PAM Product Architect - One Identity