How to Protect Next Generation Technology from Modern Threats
Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.
Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them. Attendees will learn:
* What are the threats to next generation technology?
* Best practices for assessing, prioritizing, and addressing next generation risks.
* Security best practices for securing your enterprise against the unique threats in next generation technologies.
IT Service Management & Control
Privacy, Governance & Risk Management
Mr. Brian Chappell
Senior Product Manager
Brian has more than 25 years of experience spanning many verticals across high-tech multi-nationals, including Amstrad plc, BBC Television and GlaxoSmithKline. He has held senior roles in most IT disciplines across the whole IT delivery chain.
Brian leads the customer architecture service for BeyondTrust. His role ensures the delivery of world-class solutions built around BeyondTrust's leading vulnerability management and privilege management platform. He is a regular speaker at industry conferences as well as a regular contributor for the press, he focuses on guidance and opinion pieces helping organisations on their journey toward best practice.