The Unix/Linux Security Puzzle: Easier To Solve Than You Think

Every organization, no matter its size, has many layers of information users – with various levels of access to the organization’s data and information resources. Many of these organizations use Unix/Linux as its operating system to process this data. Some of these users might have access to specific, highly sensitive data, and others may not. Whatever access a user has, hackers are interested in trying to take advantage of that access to gain entry into the organizations Unix/Linux environment and especially the privileged accounts that contain the most coveted information.

Your privileged accounts are referred to as “the keys to the kingdom” because they are a primary target for cybercriminals who understand the value of these accounts and will do whatever they can to access and control them and it is your responsibility to protect them. This webinar will examine how solutions such as privileged access management (PAM) technologies are designed to make the management of privileged accounts easier and ensure that only the users you designate can access your organization's most sensitive data.

Tune into this webinar with Security Expert, Derek A. Smith, to learn:

• The security challenge of Unix/Linux systems

• Why using the Sudo command to secure Unix/Linux privileged accounts is not sufficient

• What you really need to protect your privileged accounts

• Tactics to effectively manage Unix/Linux privileged accounts

• Understand how users utilize root

Derek A. Smith

Founder, National Cybersecurity Education Center

Derek A. Smith is an expert at cybersecurity, cyber forensics, healthcare IT, SCADA security, physical security, investigations, organizational leadership and training. He is currently an IT Supervisor at the Internal Revenue Service. He is also owner of The Intercessors Investigative and Training Group (www.theintercessorgroup.com). Formerly, Derek worked for several IT companies including Computer Sciences Corporation and Booz Allen Hamilton. Derek spent 18 years as a special agent for various government agencies and the military. He is also a cyber security professor at the University of Maryland, University College and Virginia University of Science and Technology and has taught for over 25 years. Derek is retired from the US Army and also served in the US Navy, and Air Force for a total of 24 years. He is completing his Doctorate Degree in Organizational Leadership and has completed an MBA, MS in IT Information Assurance, Masters in IT Project Management, and a BS in Education. Derek has written several books including Cybersense: The Leaders Guide to Protecting Critical Information, and its companion workbook, and he has contributed to several other books as an author and technical adviser.