- This event has passed so registration is closed.
Overview
In the last twenty years, Privilege Access Management has gone through many evolutions to keep pace with an ever-changing cyberthreat landscape. Although privileged accounts are a crucial part of day-to-day work for admins, most of them are only used for a short amount of time. The rest of the day, they can be compromised by attackers and misused by insiders.
Contemporary solutions reduce this risk only to some extent, while being costly and time-consuming to deploy; it doesn’t have to be this way! In this session, we’ll show you how simply managing accounts is old school and explore new easy to adopt approaches that deal with the problem head-on.
Join this session to:
- Learn how to leverage the new approach of privilege orchestration to remove known attack surfaces when at rest
- Explore improved ways to dynamically delegate access according to use case
- See how quickly privileged access management tools can be adopted to centrally control and audit access
Moderator
Dr. Curtis Campbell – Vice President and Manager of IT Governance
Dr. Curtis Campbell serves as Director on the International Board of Information Systems Security Association (ISSA). She holds Bachelor and Master of Science degrees from the University of TN and a PhD in Organizational Leadership/ Information Systems.
Dr. Campbell, a 25-year cybersecurity professional, holds the designations of Chief Information Security Officer (C|CISO) and Certified Information Privacy Manager (CIPM). Her experience includes cybersecurity leadership, governance, risk, and compliance, third party risk and IT audits in regulatory environments.
Dr. Campbell works with executive leadership to mitigate risk and develop strategic improvements related to cybersecurity.
As ISSA Fellow, she is recognized for significant contributions to the cyber community, cyber profession, ISSA leadership and sustained ISSA membership. The elite status of ISSA Fellow designation belongs to only 2% of ISSA membership. As an ISSA Fellow, Curtis has 11+ years of association membership with over 20+ years of relevant professional experience speaking at local and national conferences and participating on cybersecurity panels.
As a current Director on the Board, she consistently moderates industry webinars, contributes to Board strategies for growth and continuous programs to benefit ISSA, and is a regular columnist for the ISSA Journal, with Women in Cybersecurity, championing women of all stages in their career.
Dr. Campbell is a thought leader and author on cybersecurity topics and the human connection between trust and unintentional insider threats in an ever-changing cybersecurity footprint. She has published over 30 research and peer-reviewed journal articles on cybersecurity including: “Solutions for Counteracting Human Deception in Social Engineering Attacks”; “Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment”; and “Securing the Vendor: Changing the Dynamic of the Infosec Relationship”, “Understanding and Incorporating Cybersecurity Ethics”, Existential Risk: Women Fighting for the Future”, and Inspiring and Preparing the Next Generation of Cybersecurity Professionals”.
Speaker/s
Martin Cannard – VP of Product Strategy, Netwrix
Martin is an experienced technologist, with over 30 years in the Privileged Access Management and security space. Prior to Netwrix, Martin led the privileged access team at BeyondTrust where he took their password management solution from unknown to a recognized leader in the industry within 3 years; he also drove the development of their new micro service-based platform for DevOps security. Prior to BeyondTrust, Martin held key management positions at Quest/Dell, Novell, Fortefi and Symantec.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.