Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreWatch the replays from our 2023 conference now!
Learn More Learn MoreFind out more about our extensive partner & integration network.
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
with Scott Hesford, Director of Solutions Engineering, APJ; Steve Dillon, Head of APAC Architecture, Ping Identity
Securing third-party access to IT and OT (operational technology) has never been more important. Not only is the supply chain a key attack vector but regulators are also focusing their attention on how organisations secure this access. Yet for many organisations challenges remain in not only securing the access, but detecting and remediating threats associated with the remote connections.
This is where uniting cloud orchestration with a privileged remote access solution can enable security teams to secure and quickly respond to threats, reducing the window for attackers to inflict damage. Join Scott Hesford, Director of Solutions Engineering, APJ, BeyondTrust and Steve Dillon, Head of APAC Architecture, Ping Identity as they share and discuss how organisations can better manage and secure their third-party remote access.
Watch this webinar to learn:
Scott Hesford has over a decade of experience in IT security. Before joining BeyondTrust in 2019, he worked as Principal Consultant for CA Technologies and other large enterprises in Australia and New Zealand. A trusted cyber security advisor to enterprise customers, his experience spans across several industries such as banking, insurance, energy and utilities, in addition to state and federal governments. At BeyondTrust, Mr Hesford is an essential contributor in the regional security engineering department, helping enterprises and government agencies improve their security posture against internal and external threats.
Steve Dillon is an identity security expert who has worked with many of Australia’s leading public and private sector businesses during the past 15 years to support their cyber resilience and effective posture against an ever increasing array of threat vectors.
As Head of APAC Architecture for Ping Identity, Steve is responsible for working with organisations to underpin their security infrastructure in support of issues ranging from CDR compliance and achieving Zero Trust to providing personalised, streamlined user experiences that allow customers and employees to access critical applications anytime, anywhere. Curious and creative, he is a trailblazer in enabling organisations to support complex security requirements while providing the seamless user experience required of businesses today.