How To Secure Vendor Privileged Access To Tribal Networks & Ensure Compliance Across Industries Presenter: Justin Strackany, Chief Customer Officer at SecureLink Presenter Bio: Justin Strackany is the Chief Customer Officer at SecureLink, the leader
How To Secure Vendor Privileged Access To Tribal Networks & Ensure Compliance Across Industries
Presenter: Justin Strackany, Chief Customer Officer at SecureLink
Presenter Bio: Justin Strackany is the Chief Customer Officer at SecureLink, the leader in vendor privileged access. He has been with SecureLink since it was founded in 2003 and has served in many customer-focused capacities, including sales engineering, implementation, customer success, account management, and onboarding new clients. Over the years he has developed deep partnerships with some of the largest, most complex enterprise organizations and technology vendors across the country and internationally in industries such as healthcare, gaming, legal, finance, and retail.
Presenter: Tony Howlett, CISO at SecureLink
Presenter Bio: Tony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP, GNSA certifications, and a B.B.A in Management Information Systems. Tony is currently the CISO of SecureLink, a vendor privilege access management company based in Austin.
Presentation Summary: Cybersecurity continues to be a significant area of concern, with an increasing frequency (63%) of a multi-million dollar, potentially deadly, security breaches, being attributed to a third party.*
These increasing risks bring stricter regulatory requirements such as being able to identify, control, and audit all access to your network – down to the individual level.
In this webinar, SecureLink’s Chief Customer Officer, Justin Strackany, and CISO, Tony Howlett, will discuss how to ensure your organization is adhering to regulatory compliance requirements such as NIGC, HIPAA, and CJIS specific to vendor remote access. They will also discuss:
– Lessons from recent third-party vendor-related data breaches
– Why privileged access should be managed differently for vendors vs. employees
– Tools and strategies to ensure third-party accountability
*Data Risk in the Third-Party Ecosystem, Ponemon Report 2017
(Tuesday) 1:00 pm - 2:00 pm