Loading Events

Privilege Sprawl — Yes, It Applies to You!

Home » Events » Privilege Sprawl — Yes, It Applies to You!

  • This event has passed so registration is closed.



Date and Time

September 20 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference


Irene Fisher


Lisa O'Connell


We've heard time and time again how privilege can be exploited for lateral movement. The challenges are understanding the extent of this commonly exploited attack surface in your environment and finding effective tools to reduce your risk.

Join this webinar to learn:
· The different types of privilege (hint: it’s not just administrator accounts)
· How easy it can be to discover and measure privilege sprawl
· The importance of tracking privilege sprawl over time
· What tools are available to minimize your attack surface


Ken Dunham – Principal Consultant, Global Security Consulting Services

Ken Dunham brings more than 30 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence. He is very active in his visionary and leadership roles with World Wide Technology, Optiv, 4D5A Security, and Rampart Research. Mr. Dunham has a long history of innovation and highly successful ventures related to anti-virus, incident response, forensics, Darknet intelligence operations, responsible disclosure, and cyber-threat intelligence. He is also proud to have served the USAF as a contractor for innovation of new training solutions for U-2, Warthog, and Predator programs for pilots and navigators. Mr. Dunham also authored the 2015 ISSA article of the year, “Troubling Trends of Espionage”, has authored multiple books and thousands of computer security articles.

Mr. Dunham founded the Boise ISSA chapter and has been an active officer of ISSA since 2001. The Boise ISSA chapter also orchestrates a very successful annual Information Security conference. Mr. Dunham also serves as an ISSA Journal mentor. Ken Dunham has also been instrumental in other cyber security groups of the industry as a founder of the Idaho InfraGard chapter (FBI) and member/officer of groups like HTCIA and ISACA.

See Ken Dunham‘s full profile.


Craig Riddell – Field CISO, Netwrix

Craig Riddell joined the Netwrix family from HP where he ran and set the strategy for all of identity and access management. He is currently focused on next generation PAM and ephemeral access across all deployment mediums and has an extensive background in all aspects of IAM implementation and strategy.

See Craig Riddell‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top