- This event has passed so registration is closed.
The last two decades have seen massive change in the IT landscape: We’ve seen workloads shift from the datacenter to the cloud, applications move from the desktop to mobile devices, and an increase in the frequency and sophistication of attacks to the point where it's not if you’ll get breached but when. Yet, the process we use for locking down access to our most sensitive systems — privileged access management (PAM) — has not fundamentally changed.
Is there a better way to approach PAM? Join this session to learn how you can:
- Leverage just in time orchestration to remove attack surfaces
- Dynamically delegate just-enough access according to use case.
- Enable administrators to do their jobs without jumping through hoops.
- Limit the spread of malware.
Lee Neely – Information Assurance APL, LLNL
Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a current ISSA International Board Member and former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely
Martin Cannard – VP of Product Strategy, Netwrix
Martin has over 30 years of experience in the privileged access management and security space. In fact, Martin led the privileged access team at BeyondTrust, taking its password management solution from unknown to a recognized leader in the industry in just 3 years. We’re delighted that both Martin and that solution are now part of the Netwrix family.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.