Randy Franklin Smith, Microsoft MVP & Windows Security Expert

Contrary to what is commonly assumed, privilege isn’t unique or limited to the boundaries of the traditional IT department. Here are some things outside the IT department we should regard as privileged and provide the same level of protection as we do for accounts with a similar risk level inside IT:

  • Banking transactions
  • SCADA
  • Software build servers
  • Automated process and manufacturing control systems
  • Commodities and securities trading
  • Patient Healthcare Systems/Data

Frequently, the applications associated with the above scenarios were not architected with today’s attackers and cyber risks in mind. In fact, some of these process control and manufacturing systems have no security at all!

In this real training-for-free webinar with cybersecurity expert Randy Franklin Smith, you will learn how to:

Then, stay tuned as product managers Jason Jones and Brian Chappell will demonstrate how the BeyondTrust privileged access management (PAM) platform can exert privileged security controls both inside the IT environment as well as for those activities and assets outside its traditional bounds.

Earn CPE Credits

CPE Credit Qualification: Many of our webinars qualify as CPE credit. Please provide your (ISC)2 ID certificate number when you register for the webinar and your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.

Prefers reduced motion setting detected. Animations will now be reduced as a result.