<< Back to Sessions Demystifying Privileged Access Management for SMBs Analyst firms focus on Fortune 5000 organizations, while typical PAM vendors usually present their own solution as the “definite” PAM. This presentation will focus on what features constitute...
<< Back to Sessions A Hackers Dream: Unmanaged Privileges In times of crisis, good security practices are often the first thing to go. Organizations are being forced to revisit their “temporary” remote working policies and tools. An expanding remote workforce...
<< Back to Sessions Machines making software: paving and maintaining the road with zero trust open source Are we staking our future on a pace we haven’t yet learned to secure? In a year long collaboration with Gene Kim and Dr. Stephen Magill, we objectively...
<< Back to Sessions Security in the age of Advanced Persistent Transformation: Fireside Chat Today, the world is adapting, rethinking, reinvigorating and reinventing every aspect of how we live, work communicate, collaborate, learn, transact business, even...
Recent Comments