Cybersecurity Insurance Checklist - Meet Insurance Requirements with BeyondTrust PAM Download for Free

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

Black Hat 2019: Cultivating a Culture of Security in your Organization

August 12, 2019

  • Blog
  • Archive

As the Product Manager for Remote Support at BeyondTrust, it is important to keep up with security trends that affect the service desk. This was my first time attending Black Hat, and I was excited to catch Dino Dai Zovi’s keynote and sit in on breakout sessions. Coming from a very hot summer in Mississippi, I was looking forward to visiting Las Vegas with its less humidity – although it still hot still just different kind than I am used to!

It’s great for product managers to attend conferences where BeyondTrust has a booth. We’re able to talk to existing customers and potential new customers and hear different perspectives than we normally encounter in our day-to-day activities. These face-to-face conversations are also a constructive opportunity for us to receive input on potential feature candidates and our product roadmap.

The BeyondTrust booth was a popular draw at the event. A common theme amongst booth visitors was the desire to protect insider and 3rd party access within their environment. Some organizations have a pretty good handle on who is coming in and out of their environment, whereas for others, it may still be the Wild West. Another hot topic was knowing and controlling what someone can do once they do gain access. Do they know admin credentials? Are they able to perform elevated tasks broadly? Are they able to access other systems once they have made initial access?

Black Hat founder Jeff Moss kicked this year’s event off by sharing his perspective that we have moved beyond the “it’s our time” topics of previous Black Hat events. High-profile security breaches are driving home the importance of a strong cybersecurity posture and a forward-thinking vision for IT risk management. With GDPR going into effect last year and a few large organizations already incurring hefty fines, the importance of protecting personal information is front-of-mind for many organizations. The sentiment now seems to be that security teams have gained the attention of decision-makers in both the public and private sectors.

However, as Dino Dai Zovi of Square stressed in the keynote, an organization’s culture of security should not be overlooked as a critical factor in how security is implemented, practiced, and upheld. He provided an example of the strong security culture at Square where security engineers are working directly with software teams providing real-time feedback loops. In the past, security teams may have been seen as outsiders, or inhibitors to productivity. Now, security teams are vital in the underlying design and architecture. While Dai Zovi’s example was for a software company, this can certainly apply to many other types of organizations as well. DevSecOps is one such movement now underway at many organizations that is trying to make this vision happen.

Having a good working relationship with your security team is vital to the success of your team and organization. Modern security tools are striving to balance security and productivity. Many BeyondTrust products can increase your overall security while also making you more efficient. This could be discovering credentials with Password Safe and mapping those to assets in your environment, enabling least privilege with Endpoint Privilege Management so your users can stay secure and productive, and securely providing privileged credentials via credential injection to your helpdesk in Remote Support.

How would you rate your relationship with the security team at your organization? Have you ever reached out to them with questions? I urge you to strike up a conversation. Ask them a question. Start thinking about security first and ensure you are doing your part to make your company more secure.


Photograph of Jonas Outlaw

Jonas Outlaw, Senior Product Manager

As Senior Product Manager, Jonas works with a variety of stakeholders in the product development lifecycle to help drive product direction and enhancements. Jonas brings more than a decade of experience to BeyondTrust in various aspects of applications development, systems engineering and product management. Prior to joining BeyondTrust, Jonas was a systems engineer at a large life insurance company. He received his MBA with a concentration in Management Information Systems from Mississippi College.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Microsoft Vulnerabilities Report 2021

Whitepapers

Privileged Access Management: PAM Checklist

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.