- This event has passed so registration is closed.
Overview
We’ve heard time and time again how privilege can be exploited for lateral movement. The challenges are understanding the extent of this commonly exploited attack surface in your environment and finding effective tools to reduce your risk.
Join this webinar to learn:
· The different types of privilege (hint: it’s not just administrator accounts)
· How easy it can be to discover and measure privilege sprawl
· The importance of tracking privilege sprawl over time
· What tools are available to minimize your attack surface
Moderator
Ken Dunham – Principal Consultant, Global Security Consulting Services
Ken Dunham brings more than 30 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence. He is very active in his visionary and leadership roles with World Wide Technology, Optiv, 4D5A Security, and Rampart Research. Mr. Dunham has a long history of innovation and highly successful ventures related to anti-virus, incident response, forensics, Darknet intelligence operations, responsible disclosure, and cyber-threat intelligence. He is also proud to have served the USAF as a contractor for innovation of new training solutions for U-2, Warthog, and Predator programs for pilots and navigators. Mr. Dunham also authored the 2015 ISSA article of the year, “Troubling Trends of Espionage”, has authored multiple books and thousands of computer security articles.
Mr. Dunham founded the Boise ISSA chapter and has been an active officer of ISSA since 2001. The Boise ISSA chapter also orchestrates a very successful annual Information Security conference. Mr. Dunham also serves as an ISSA Journal mentor. Ken Dunham has also been instrumental in other cyber security groups of the industry as a founder of the Idaho InfraGard chapter (FBI) and member/officer of groups like HTCIA and ISACA.
Speaker/s
Craig Riddell – Field CISO, Netwrix
Craig Riddell joined the Netwrix family from HP where he ran and set the strategy for all of identity and access management. He is currently focused on next generation PAM and ephemeral access across all deployment mediums and has an extensive background in all aspects of IAM implementation and strategy.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.