LEVELING THE PLAYING FIELD: Privileged Access Management in Cybersecurity