SC Media webcasts | IT Security

Webcasts

UPCOMING WEBCASTS

This form filters webcasts that are directly below it based on the options given. Filtering will occur immediately when an option is selected or when the form is reset.
Show:
Vendor Webcast

Friction-free DevOps: How to secure and govern silently

Software developers are tasked with developing and releasing software at breakneck speed, while security teams must have visibility into every workload that debuts to measure risk. Cloud security teams can’t be autonomous as they depend on developers to install security agents to give them that very workload visibility. What’s more?…

Register for Friction-free DevOps: How to secure and govern silently

Sponsored by: Orca

Friction-free DevOps: How to secure and govern silently

Software developers are tasked with developing and releasing software at breakneck speed, while security teams must have visibility into every workload that debuts to measure risk. Cloud security teams can’t be autonomous as they depend on developers to install security agents to give them that very workload visibility. What’s more? Security teams are drowning in nonprioritized alerts with little to no context, which results in fatigue and distrust. How do we expect developers to be able to interpret such information? It’s a relationship fraught with friction right from the start.

Join this webcast to:

• explore the challenge of quickly securing new applications and
• identify some strategies to reduce and entirely remove friction among teams.

Speaker

Patrick Pushor

Technical Evangelist

Orca Security

Patrick is a serial startup technologist having played early and key roles in over six startups across four countries in the past 12 years including multiple cybersecurity and fintech companies. Previously, he worked as an independent consultant focused on infrastructure and integration projects in nearly every industry from national defense to agriculture. More recently, Patrick helped define the CSPM market as an early employee at Dome9 Security and is leveraging that experience at Orca Security to revolutionize how we think about and approach cloud workload protection.

Face-to-Face webcast

The marauders within

Threats don’t come only from external sources; data exposure events caused by insiders can often be more destructive. Malicious insider attacks unquestionably have a damaging impact on organizations, but non-malicious insider incidents occur every day – when users with legitimate access are involved in unintentional data loss or exposure –…

Register for The marauders within

Sponsored by: Code42

The marauders within

Threats don’t come only from external sources; data exposure events caused by insiders can often be more destructive. Malicious insider attacks unquestionably have a damaging impact on organizations, but non-malicious insider incidents occur every day – when users with legitimate access are involved in unintentional data loss or exposure – and can cause just as much damage. The challenge of insider risk has grown with the rapid shift to remote work, because of the pandemic and the accelerated adoption of sanctioned and unsanctioned collaboration tools.

In this webcast, Code42 CTO Rob Juncker will talk about:

• the likelihood and impact of data exposure or exfiltration as a natural result of how employees work and

• why security pros must shift their mindset from focusing only on intentional acts by malicious users to addressing the more broadly created risks caused by employees simply doing their jobs.

Attendees of this webcast may be eligible for half a CPE credit.

Speaker

Rob Juncker

Chief Technology Officer

Code42

Speaker

Stephen Lawton

Special Projects Editorial Director

SC Media

Vendor Webcast

Has XDR Crossed the Chasm/ EDR is dead, long live XDR

When Cortex XDR was launched in 2019 by Palo Alto Networks as a solution to a siloed detection and response market, no one could anticipate the speed at which Extended Detection and Response (XDR) would proliferate across security operation centers globally. Join Josh Zelonis, Field CTO and Evangelist at Palo…

Register for Has XDR Crossed the Chasm/ EDR is dead, long live XDR

Sponsored by: Palo Alto Networks

Has XDR Crossed the Chasm/ EDR is dead, long live XDR

When Cortex XDR was launched in 2019 by Palo Alto Networks as a solution to a siloed detection and response market, no one could anticipate the speed at which Extended Detection and Response (XDR) would proliferate across security operation centers globally.

Join Josh Zelonis, Field CTO and Evangelist at Palo Alto Networks as he takes attendees through the evolution of XDR and why he believes XDR has crossed the chasm as both a product and a product category.

This webinar will provide a deep dive into XDR as a product category, while using the Forrester Endpoint Security Suites Wave and round 3 of the MITRE ATT&CK evaluations to provide insight into Cortex XDR’s market strategy.

In this webinar, Josh will:

  • Deep dive into XDR as a product category, providing analyst perspectives on features and functions
  • Discuss the market landscape of companies competing in the XDR space and how it will impact the space
  • Provide analysis from recent market evaluations to show how Cortex XDR has evolved in the last two years from being a market creator, to a market leader.
Speaker

Josh Zelonis

Cortex CTO

Palo Alto Networks

Josh Zelonis is a Field CTO and Evangelist for Palo Alto Networks where he works closely with organizations to help them adapt their architecture, policies, and processes to stay ahead of evolving threats and limit the potential impact of incidents. As a former Forrester analyst and cybersecurity tech founder, Josh has spoken at major conferences around the world and published on subjects ranging from security analytics, cyber intelligence, vulnerability management, SOC operations, and incident response. Above all, he prides himself on a mission to secure the data of the people we’re entrusted to protect.

ON-DEMAND WEBCASTS

This form filters webcasts that are directly below it based on the options given. Filtering will occur immediately when an option is selected or when the form is reset.
Show:
Vendor Webcast

Are you keeping up with phishing attacks?

Phishing today is as dangerous and prevalent as it’s ever been, often saddling organizations with ransomware attacks and destructive and dangerous malware infestations. Fortunately, through a combination of threat intelligence, threat hunting, managed phishing and threat detection services and employee training, companies and their security teams can effectively fight back.

Register for Are you keeping up with phishing attacks?

Sponsored by: Cofense

Are you keeping up with phishing attacks?

Phishing today is as dangerous and prevalent as it’s ever been, often saddling organizations with ransomware attacks and destructive and dangerous malware infestations. Fortunately, through a combination of threat intelligence, threat hunting, managed phishing and threat detection services and employee training, companies and their security teams can effectively fight back. A recent phishing study conducted by CRA and underwritten by Cofense will reveal how large organizations around the world are managing the significant increase in phishing attacks since 2020.

Attend this webcast to:

• hear how IT security leaders are confronting phishing and the challenges they face;

• learn how to identify the latest types of phishing threats and defend against new phishing attacks; and

• understand how to train your staff for the next generation of phishing.

Speaker

Aaron Higbee

Chief Technology Officer and Co-Founder

Cofense

Co-founder and CTO of Cofense, Aaron has more than 20 years of cybersecurity and senior management leadership.

Speaker

Tonia Dudley

Strategic Security Advisor

Cofense

Tonia Dudley, Strategic Advisor, joined Cofense in 2018. In this role, she focuses on phishing defense advocacy while demonstrating how Cofense solutions help organizations worldwide minimize the impact of attacks thus reducing operations costs. Dudley evangelizes Cofense’s approach to phishing defense and incident response to new and existing customers, prospects, and the information technology market through speaking engagements, publishing platforms, and numerous media opportunities. Dudley also advises Cofense product teams on specific customer and market-driven needs to help streamline product roadmaps. She was instrumental in creating Cofense’s inaugural international customer advisory board. Dudley represents Cofense on the Board of Directors for the National Cyber Security Alliance. 

Speaker

Adrian Sanabria

Senior Research Engineer

Cyber Risk Alliance

Adrian joined SC Media’s parent company, CyberRisk Alliance in 2020. He will focus primarily on cybersecurity product reviews, but will also provide industry insight trends for both SC Media and Security Weekly (another CyberRisk Alliance company). He brings two decades of industry experience, working as a practitioner, penetration tester, and industry analyst. He spent the last few years as an entrepreneur, challenging norms in sales and marketing for a variety of vendors. Adrian loves to cook, eat, hike, play music and regale his teenagers with stories of what the early days of the Internet were like.

Speaker

Dana Jackson

VP of Research

CyberRisk Alliance

Speaker

Stephen Lawton

Special Projects Editorial Director

SC Media

Attendees of this webcast may be eligible for one CPE credit.

Face-to-Face webcast

Unlock data-centric security

Perimeter security likely will not be enough to secure the networks of the future. Today’s perimeter is more like tentacles that reach out far beyond the borders of the corporate network and cloud and into your partners’ networks, kiosks and mobile devices. So how do you protect your data at…

Register for Unlock data-centric security

Sponsored by: virtru

Unlock data-centric security

Perimeter security likely will not be enough to secure the networks of the future. Today’s perimeter is more like tentacles that reach out far beyond the borders of the corporate network and cloud and into your partners’ networks, kiosks and mobile devices. So how do you protect your data at rest, in transit or in use? Zero trust is an option, but is your definition of zero trust the same as your client’s or your business partner’s? Encryption everywhere is an option, but it too has its challenges. Building a data-centric defense requires more than just slapping on a new app or plugging in a new firewall, but do you know what it takes to be fully implemented and manageable?

Join this webcast to:

· understand the data security challenges CISOs and security teams are facing today;

· see what data security obstacles they’ll be facing in the future; and

· learn what to look for when future-proofing your data security.

Attendees of this webcast may be eligible for half a CPE credit.

Speaker

Will Ackerly

Co-Founder and CTO

Virtru

Will is the Chief Technology Officer and Cofounder of Virtru. Prior to founding Virtru in 2012, Will spent eight years at the National Security Agency (NSA) where he specialized in cloud analytic and security architecture. During his tenure at the NSA, Will led the development of the Trusted Data Format (TDF), an open standard published by the US Office of Director of National Intelligence (ODNI) and used today by agencies and companies for the secure transfer of data and the technical foundation on which Virtru was founded. Will holds 25 patents, and is a frequent speaker and quoted expert on cryptography, data protection, and big data analytics.

Speaker

Stephen Lawton

Special Projects Editorial Director

SC Media

Editorial webcast

CRAE Index reveals how cybersecurity leaders are responding to increased threats

If you’d like to hear how security pros are responding and adapting to increased attacks and breaches — including facilitating more comprehensive cyber threat management strategies and best practices and increasing investments and utilization of resources — join the discussion of our panel experts. The Cybersecurity Resource Allocation &…

Register for CRAE Index reveals how cybersecurity leaders are responding to increased threats

Sponsored by: ivanti

CRAE Index reveals how cybersecurity leaders are responding to increased threats

If you’d like to hear how security pros are responding and adapting to increased attacks and breaches — including facilitating more comprehensive cyber threat management strategies and best practices and increasing investments and utilization of resources — join the discussion of our panel experts.

The Cybersecurity Resource Allocation & Efficacy (CRAE) Index study for Q1 2021, from CyberRisk Alliance Business Intelligence, is about to be refreshed. It offers CISOs valuable purchasing information from companies, with 500 or more employees, in North America and Europe. This report, underwritten by Ivanti, is the fourth in a quarterly series of index reports and will serve as a year-end review of the index since its inception in mid-2020.

Join our panelists on this Face-to-Face webcast to:

• review survey results from CRAE Index’s Q1 global research study;

• learn the latest trends on proactive and reactive cybersecurity; and

• hear insights from our panel of experts on what lies ahead.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Todd Fitzgerald

Executive in Residence and Chairman of the Executive Committee

Cybersecurity Collaborative Executive Committee

Speaker

Mike Riemer

Global Chief Technology Officer

Pulse Secure (acquired by Ivanti)

Speaker

Stephen Lawton

Special Projects Editorial Director

SC Media

Speaker

Dana Jackson

VP of Research

CyberRisk Alliance

Vendor Webcast

The future of code security with transparent benchmarking

The demand for automation in vulnerability discovery increases with the number of lines of code released every minute. The ability to identify vulnerabilities in source code comprehensively, efficiently, and with few false positives is an important primitive to achieve this. In this session, see how we demonstrate success in these…

Register for The future of code security with transparent benchmarking

Sponsored by: ShiftLeft

The future of code security with transparent benchmarking

The demand for automation in vulnerability discovery increases with the number of lines of code released every minute. The ability to identify vulnerabilities in source code comprehensively, efficiently, and with few false positives is an important primitive to achieve this.

In this session, see how we demonstrate success in these areas, including:

• how ShiftLeft transparently proves its OWASP benchmark;

• the backbone of our technology behind our accuracy; and

• how we increase developer productivity with reduced time for investigation and triage.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Chetan Conikee

Chief Technology Officer

ShiftLeft

Chetan is a serial entrepreneur with over 20+ years of experience in authoring and architecting mission critical software. His expertise includes building web-scale distributed infrastructure, personalization algorithms, complex event processing, fraud detection, and prevention in investment/retail banking domains. He was most recently Chief Data Officer and GM Operations at CloudPhysics. Prior to CloudPhysics he was part of early founding teams at CashEdge (acquired FiServ), Business Signatures (acquired Entrust) and EndForce (acquired Sophos).Chetan earned his M.S. in Computer Engineering from Iowa State University and B.S in Computer Science and Engineering from Bangalore University.

Vendor Webcast

Achieve friction-free zero trust with business partners

Supply chain hacks rose 42% in Q1 2021 compared to the prior quarter, and nearly 140 organizations reported being impacted by supply chain attacks in Q1, according to the Identity Theft Resource Center. If attackers’ success in executing supply chain attacks, business email compromise, and financial fraud are dependent on…

Register for Achieve friction-free zero trust with business partners

Sponsored by: Area 1 Security

Achieve friction-free zero trust with business partners

Supply chain hacks rose 42% in Q1 2021 compared to the prior quarter, and nearly 140 organizations reported being impacted by supply chain attacks in Q1, according to the Identity Theft Resource Center.

If attackers’ success in executing supply chain attacks, business email compromise, and financial fraud are dependent on exploiting your partners’ vulnerabilities — yet you have little control or visibility over your partners’ security — how can you still effectively protect your organization? The answer lies in applying zero trust principles to all communications, across your organization’s entire network.

Join this webcast to learn:

• how your partner social graph results in increased risk surface area;

• why email security plays a critical role in establishing a zero trust architecture, that can be extended to your business partners and suppliers; and

• how to leverage email security to prevent targeted cyber attacks.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Phil Syme

Chief Technology Officer

Area 1 Security

Phil Syme has 22 years of information technology experience. His areas of expertise include system architecture, data processing at scale, and cloud technologies. Phil was previously a Chief Engineer at Next Century Corporation, co-founder and Principal Engineer at eSymmetrix, and co-authored two introductory programming books.

Speaker

Kevin Wilson

Senior Product Manager and former CISO at GUESS?

Area 1 Security

Kevin Wilson is a Sr. Product Manager at Area 1 Security. Throughout his 14 year in Cyber Security, Kevin has been an Analyst and Engineer in various organizations such as the U.S Navy, First Data, and Lowe’s. Previously he served as the Global Information Security Officer at Guess? Inc as well as a Product Manager for McAfee.

DemoCast webcast

How to eliminate security blind spots across AWS, Azure and GCP

Are you using agents, network scanners, or CSPM tools to detect risks across your public cloud estate? If so, there’s a better way. Delivered as SaaS, Orca’s SideScanning technology reads your cloud configuration and workloads’ runtime block storage out-of-band, giving you cloud-wide, workload-deep security and compliance for AWS, Azure and…

Register for How to eliminate security blind spots across AWS, Azure and GCP

Sponsored by: Orca

How to eliminate security blind spots across AWS, Azure and GCP

Are you using agents, network scanners, or CSPM tools to detect risks across your public cloud estate? If so, there’s a better way. Delivered as SaaS, Orca’s SideScanning technology reads your cloud configuration and workloads’ runtime block storage out-of-band, giving you cloud-wide, workload-deep security and compliance for AWS, Azure and GCP – without the gaps in coverage, alert fatigue and operational costs of agents.

Attend this Democast to see:

• Orca’s 5-minute onboarding process;
• the power of addressing the control plane and data plane at once;
• the scanning process for vulnerabilities, misconfigurations, malware, lateral movement risk, exploitable keys, weak passwords and unsecured sensitive data; and
• how to prioritize risk based on the underlying security issue, its accessibility and blast radius.

A live Q&A will follow the presentation, so bring your toughest cloud security questions.

Attendees of this webcast may be eligible for half a CPE credit.

Speaker

Patrick Pushor

Technical Evangelist

Orca Security

Vendor Webcast

Magnify your threat visibility in a hybrid world

In a hybrid world, the ability to identify and stop a threat before it becomes a breach is an uphill battle. Many organizations struggle to maintain proactive security. Managed Detection and Response (MDR) services can help alleviate these burdens while ensuring a proactive, robust security posture. Join Trustwave in this…

Register for Magnify your threat visibility in a hybrid world

Sponsored by: Trustwave

Magnify your threat visibility in a hybrid world

In a hybrid world, the ability to identify and stop a threat before it becomes a breach is an uphill battle. Many organizations struggle to maintain proactive security. Managed Detection and Response (MDR) services can help alleviate these burdens while ensuring a proactive, robust security posture.

Join Trustwave in this session to learn more about:

• optimizing your existing security solutions;
• effectively stopping threats; and
• advancing your current capabilities to enable a proactive security posture.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Jesse Emerson

Vice President, Managed Security Services

Trustwave

Jesse has worked in cybersecurity for almost 20 years, starting on the front lines as a SOC Analyst back in the early days of Intrusion Analysis. In his career he has managed Security Operations Centers, Digital Forensics & Incident Response and Threat Research teams for Fortune 50 organizations as well as consulted in the build and optimization of dozens of Cyber Defense Center projects around the globe in multiple industry sectors.

Vendor Webcast

Hacking multifactor authentication: An IT pro’s lessons learned after testing 150 MFA products

Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking Multifactor Authentication, Roger tested over 150 MFA…

Register for Hacking multifactor authentication: An IT pro’s lessons learned after testing 150 MFA products

Sponsored by: KnowBe4

Hacking multifactor authentication: An IT pro’s lessons learned after testing 150 MFA products

Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking Multifactor Authentication, Roger tested over 150 MFA solutions. And he wants to share what he learned with you!

Join Roger as he discusses the good, the bad, and the ugly lessons he learned from his research. He’ll share with you what works, what doesn’t, and what you should absolutely avoid.

In this webinar you’ll learn about:

• Differences between various MFA tools and why they matter
• Real-world hacking techniques Roger used to expose MFA weaknesses
• What makes MFA software weak or strong and what that means to you
• Tips on choosing the best MFA software for your company
• Why a strong human firewall is your best last line of defense

Get the details you need to know to become a better IT security defender.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Roger Grimes

Data-Driven Defense Evangelist

KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

Vendor Webcast

Leaders prioritize their top 5 security investments

Every cybersecurity leader wants to ensure a secure, compliant and agile future, but knowing what to prioritize and when to make the right investments can be challenging. That’s why we recently surveyed more than 250 global IT security executives about their timeline and key drivers for five significant security investments:…

Register for Leaders prioritize their top 5 security investments

Sponsored by: FireMon

Leaders prioritize their top 5 security investments

Every cybersecurity leader wants to ensure a secure, compliant and agile future, but knowing what to prioritize and when to make the right investments can be challenging. That’s why we recently surveyed more than 250 global IT security executives about their timeline and key drivers for five significant security investments:

1. Amping up automation
2. Embracing Zero Trust
3. Implementing SASE
4. Addressing misalignment between security and development
5. Managing growing heterogeneity

Join us for this important webinar to learn where your organization should invest to scale with your network and protect everything.

Attendees of this webcast may be eligible for one CPE credit.

Speaker

Keith Brennan

Director of Field Engineering

FireMon

Keith Brennan is the Director of Field Engineering for FireMon, where he works closely with clients to make sure technical and corporate objectives remain aligned. Before joining FireMon, Keith served as the CISO for a California based healthcare organization. He has over 25 years of IT experience including the past 16 focused on Information Security.

DemoCast webcast

How to protect your data with zero-trust security

Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a clean…

Register for How to protect your data with zero-trust security

Sponsored by: ThreatLocker

How to protect your data with zero-trust security

Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a clean and comprehensive approach to ensuring ransomware does not end up in your environment.

Join this webcast to learn:

• news about the latest cybersecurity breaches along with assets and tools you can implement in your business;

• how easily malware can evade antivirus and other threat detection tools; and

• how to implement zero-trust security.

Attendees of this webcast may be eligible for half a CPE credit.

Speaker

Danny Jenkins

CEO

ThreatLocker

Danny Jenkins is the CEO & Co-Founder of ThreatLocker, an Orlando-based cybersecurity firm providing zero-trust endpoint security. Danny is a leading expert in cybersecurity with over two decades of experience in building and securing corporate networks, including many roles on red teams and blue teams. He is dedicated to educating industry professionals about the latest cyber threats and frequently speaks on the topics of ransomware, zero trust, and zero-day vulnerabilities. Before taking the reins at ThreatLocker, Danny co-founded MXSweep, a global provider of email and internet security SaaS applications based in Dublin, Ireland, that sold exclusively through the channel. MXSweep later went on to be sold to J2. Danny was also the CEO at Sirrustec, specializing in whitelabeled channel delivered email security. Sirrustec Sold to Censornet in 2014

DemoCast webcast

5 Cloud security best practices your organization should follow

Controlling access to the cloud is one of the most critical security controls a company can take. The latest Verizon Data Breach Report tells us that one in every four attacks has been tied to a cloud data breach. This webcast will cover 5 cloud security best practices your organization…

Register for 5 Cloud security best practices your organization should follow

Sponsored by: Thycotic

5 Cloud security best practices your organization should follow

Controlling access to the cloud is one of the most critical security controls a company can take. The latest Verizon Data Breach Report tells us that one in every four attacks has been tied to a cloud data breach. This webcast will cover 5 cloud security best practices your organization can follow and how to minimize user friction in order to implement usable security solutions. Our goal is to give you and your team a better understanding of the specific risks associated with cloud security and how to minimize and mitigate those threats.

Join Thycotic for this webcast and:

• learn 5 cloud security best practices;

• see how to implement usable security solutions; and

• watch privileged access management (PAM) in action.

Attendees of this webcast may be eligible for half a CPE credit.

Speaker

Sara Shuman

Product Marketing Manager

Thycotic

Sara Shuman brings a decade of experience working in product management and marketing for technology organizations. She helps drive marketing strategy, messaging and positioning, sales enablement, and content creation for several of Thycotic’s products. Sara has a passion for thought leadership, community, and banana bread.

Speaker

Dan Ritch

Product Manager

Thycotic

Dan Ritch has six years of cybersecurity expertise and over a decade in the IT field. When he’s not interviewing customers or demoing Thycotic products, he can be found tinkering with product roadmaps.

DemoCast webcast

Top 5 gaps in current privilege access management deployments

It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management technologies, but these solutions have struggled to address the…

Register for Top 5 gaps in current privilege access management deployments

Sponsored by: Remediant

Top 5 gaps in current privilege access management deployments

It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management technologies, but these solutions have struggled to address the problem for five key reasons. In this discussion, we will address the gaps in current access management approaches but, more importantly, show you how to quickly close the gaps and significantly reduce security risks without disrupting your current investments or systems.

Join Remediant in this webcast to:

· learn the five reasons why privilege access management implementations fail;
· identify areas in your IAM program where you can reduce admin access risk; and
· capitalize on existing investments, while improving your risk posture.

Attendees of this webcast may be eligible for half a CPE credit.

Speaker

JD Sherry

Chief Strategy Officer

Remediant, Inc.

JD Sherry, Chief Strategy Officer, is a seasoned technology executive and is responsible for providing vision and awareness regarding the latest trends in cyber security, risk and compliance. Well-versed in enterprise security and data center architecture, as a former practitioner and CEO, JD has successfully implemented large-scale public, private and hybrid clouds emphasizing security architecture best practices to meet strict compliance standards.