Managing privileged account passwords is a first step to strengthen your security posture, but important gaps remain that can easily be exploited by bad actors. Learn how to combine password vaulting with the following, all while securing remote access and monitoring all privileged sessions:
- Brokering of identities
- MFA enforcement
- Just-enough privilege
Dr. Torsten George, Cybersecurity Evangelist, Centrify
Torsten is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 25 years and regularly provides commentary and publishes articles on data breaches, insider threats, cyber warfare, incident response, and IT security best practices, as well as other cyber security topics in media outlets.
Tony Goulding, Senior Director of Technical Marketing, Centrify
Tony brings over 30 years of experience in security, software, and customer relationship-building to the Centrify team.