In 2018, there were over 11 major breaches caused by exploitation of third-party vendors. And, third-party breaches (Target, Saks 5th Avenue, Universal Music Group, Applebee’s, etc.) rank amongst the costliest, and most damaging of all security incidents.
While IT administrators, insiders, and third-party vendors need privileged access to effectively do their jobs, this shouldn’t mean ceding control of your IT environment. In this webinar, cybersecurity expert Derek A. Smith will discuss how to extend the best practice privileged access security controls to your third-party vendors. You will discover how to:
Derek A. Smith is an expert at cybersecurity, cyber forensics, healthcare IT, SCADA security, physical security, investigations, organizational leadership and training. He is currently an IT Supervisor at the Internal Revenue Service. He is also owner of The Intercessors Investigative and Training Group (www.theintercessorgroup.com). Formerly, Derek worked for several IT companies including Computer Sciences Corporation and Booz Allen Hamilton. Derek spent 18 years as a special agent for various government agencies and the military. He is also a cyber security professor at the University of Maryland, University College and Virginia University of Science and Technology and has taught for over 25 years. Derek is retired from the US Army and also served in the US Navy, and Air Force for a total of 24 years. He is completing his Doctorate Degree in Organizational Leadership and has completed an MBA, MS in IT Information Assurance, Masters in IT Project Management, and a BS in Education. Derek has written several books including Cybersense: The Leaders Guide to Protecting Critical Information, and its companion workbook, and he has contributed to several other books as an author and technical adviser.