with Scott Hesford, Director of Solutions Engineering, APJ; Steve Dillon, Head of APAC Architecture, Ping Identity
Securing third-party access to IT and OT (operational technology) has never been more important. Not only is the supply chain a key attack vector but regulators are also focusing their attention on how organisations secure this access. Yet for many organisations challenges remain in not only securing the access, but detecting and remediating threats associated with the remote connections.
This is where uniting cloud orchestration with a privileged remote access solution can enable security teams to secure and quickly respond to threats, reducing the window for attackers to inflict damage. Join Scott Hesford, Director of Solutions Engineering, APJ, BeyondTrust and Steve Dillon, Head of APAC Architecture, Ping Identity as they share and discuss how organisations can better manage and secure their third-party remote access.
Watch this webinar to learn:
Scott Hesford has over a decade of experience in IT security. Before joining BeyondTrust in 2019, he worked as Principal Consultant for CA Technologies and other large enterprises in Australia and New Zealand. A trusted cyber security advisor to enterprise customers, his experience spans across several industries such as banking, insurance, energy and utilities, in addition to state and federal governments. At BeyondTrust, Mr Hesford is an essential contributor in the regional security engineering department, helping enterprises and government agencies improve their security posture against internal and external threats.
Steve Dillon is an identity security expert who has worked with many of Australia’s leading public and private sector businesses during the past 15 years to support their cyber resilience and effective posture against an ever increasing array of threat vectors.
As Head of APAC Architecture for Ping Identity, Steve is responsible for working with organisations to underpin their security infrastructure in support of issues ranging from CDR compliance and achieving Zero Trust to providing personalised, streamlined user experiences that allow customers and employees to access critical applications anytime, anywhere. Curious and creative, he is a trailblazer in enabling organisations to support complex security requirements while providing the seamless user experience required of businesses today.