Presenter Photo

Many organizations continue to face access management challenges as they expand their compute footprint to the cloud and work through acquisitions, outsourcing, and digital transformation initiatives. Over the past several years, data breach research studies have highlighted vendor remote access as one the most common—and damaging—cyberattack vectors. Still, businesses lack a coherent model for protecting expanding use cases for third-party access, so these remote access weak links continue to be exploited.

Join Dan Blum, cybersecurity author and expert, who will explore:

  • Best-practice strategies to control third-party risk
  • Why VPNs aren't the best answer (not even close!)
  • Common gaps in privileged access management systems
  • Setting requirements for privileged vendor access

ISC2 CPE Logo

CPE Credit Qualification: Many of our webinars qualify as CPE credit. Please provide your (ISC)2 ID certificate number when you register for the webinar and your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.

Dan Blum

Managing Partner and Principal Consultant at Security Architects Partners

An internationally recognized expert in cybersecurity, risk management, cloud computing, and identity management, Dan Blum leads or contributes projects such as performing security assessments and developing customers’ risk management programs and identity management or security strategy or architecture road maps. Formerly a Golden Quill award-winning vice president and distinguished analyst at Gartner, Blum has participated in industry groups such as ISACA, IDPro, the Cloud Security Alliance, Kantara Initiative, OASIS and others. He is also the author of the upcoming book “Rational Cybersecurity for the Business.”