NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Videos
    • Glossary
    • Infographics
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

Securing DoD Enterprise Innovation with ICAM

with Stephen M. Wallace, Systems Innovation Scientist, Emerging Technology Directorate, Defense Information Systems Agency (DISA)

Agency modernization, expanding cloud deployments, and distributed workforces create new planes of privilege for adversaries to exploit. When designing the future state of The Defense Department’s complex enterprise network, a least-privilege approach is critical to keep pace with adversaries and lower your attack surface. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust, always verify, and only allow privileged access when needed or contextual parameters are met.

BeyondTrust, MG Joe Brendler, US Army (Ret.), and Stephen M. Wallace, Systems Innovation Scientist, Emerging Technology Directorate, to understand why Privileged Access Management (PAM) is integral to secure the adoption of emerging initiatives across the government.

These cyber leaders discussed:

  • Why PAM is critical when developing programs like ICAM and EITaaS
  • How Zero Trust, ICAM, and Enterprise Network Modernization correlate
  • The Defense Department’s outlook on Enterprise Network Modernization
  • The path to secure modernization using least privilege or “just-in-time” best practices

Meet the Presenters

Photograph of Stephen M. Wallace

Stephen M. Wallace, Systems Innovation Scientist, Emerging Technology Directorate, Defense Information Systems Agency (DISA)

Mr. Stephen Wallace is Systems Innovation Scientist for the Emerging Technologies (EM) Directorate at the Defense Information Systems Agency (DISA). Wallace focuses on delivering innovative processes, services, and capabilities across the agency. The EM Directorate develops, executes, prioritizes, and collaborates EM-based needs such as browser isolation, Software Defined Networking and Assured Identity.

Photograph of Joe Brendler

Joe Brendler, MG Joe Brender, US Army (Ret.)

MG (ret.) Joseph Brendler is a senior executive and thought leader with more than 30 years of experience managing large organizations specializing in delivery of information technology (IT), networks, and cybersecurity solutions. He has led strategic and tactical planning; engineering and operations; budget, program, and contract management; change management; partnership development; and service delivery. Clients benefit immensely from MG Brendler’s technical, organizational, strategic, and administrative expertise and experience.

Photograph of Josh Brodbent

Josh Brodbent, RVP, Public Sector Solutions Engineering

Josh has more than 20 years in IT experience and has architected identity and privilege access management solutions for over 3 million user accounts. He joined BeyondTrust in 2018 as a Senior Solutions Engineer and was quickly selected to lead the team. Prior to BeyondTrust, he was a senior Solutions architect for Quest Software. He began his career by founding a managed service provider (MSP) at 12. He held multiple industry certifications by 14, making him the youngest in the nation to do so. That MSP went on to become successful, and ultimately his launching point into Public Sector architecture and support.

Watch our Webinar

Because this webinar is hosted by Carahsoft.com, you'll register on their site.

Go to registration page

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Infographics
  • Podcast
  • Videos
  • Webinars
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.