Contrary to what is commonly assumed, privilege isn’t unique or limited to the boundaries of the traditional IT department. Here are some things outside the IT department we should regard as privileged and provide the same level of protection as we do for accounts with a similar risk level inside IT:
Frequently, the applications associated with the above scenarios were not architected with today’s attackers and cyber risks in mind. In fact, some of these process control and manufacturing systems have no security at all!
In this real training-for-free webinar with cybersecurity expert Randy Franklin Smith, you will learn how to:
Then, stay tuned as product managers Jason Jones and Brian Chappell will demonstrate how the BeyondTrust privileged access management (PAM) platform can exert privileged security controls both inside the IT environment as well as for those activities and assets outside its traditional bounds.
Randy Franklin Smith is an internationally recognized expert on the security and control of Windows and Active Directory security who specializes in Windows and Active Directory security. He performs security reviews for clients ranging from small, privately held firms to Fortune 500 companies, national, and international organizations.
Randy Franklin Smith began his career in information technology in the 1980s developing software for a variety of companies. During the early 1990s, he led a business process re-engineering effort for a multi-national organization and designed several mission critical, object-oriented, client/server systems. As the Internet and Windows NT took off, Randy focused on security and led his employer's information security planning team. In 1997, he formed Monterey Technology Group, Inc. where he serves as President.