Building and Maintaining an Effective Remote Access Strategy

The COVID-19 pandemic transformed enterprises into remote workplaces overnight, forcing IT organizations to revamp their computing and networking strategies on the fly. Some of the changes were intended to be temporary, and some rules were adopted without thinking through all the implications. With businesses moving to permanent work-from-home and hybrid work models, enterprise IT teams need to rebuild their security strategies and switch off temporary rules and controls. In this webinar, experts discuss how to rethink the remote computing architecture and adjust the rules to consider remote networking and access, all the while giving users safe access to corporate systems and data.

Available:
Tue, Aug 02, 2022 10:00 AM PDT / 01:00 PM EDT
Duration:
1h 00min

Attendees can expect to learn about:

  • Remote work policies that safeguard identity, access and user data.
  • Balancing user convenience against security policies that satisfy the "C" suite.
  • Password and account management that are speedy, efficient and secure.
  • Handling the increased workload that comes with keeping remote workers’ data and devices secure.

Featured Speakers

  • Brad Causey
    Brad Causey
    Vice President of Offensive Security
    SecurIT360

    Brad Causey is an active member of the security and forensics community worldwide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is a member of the OWASP Global Projects Committee and the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad also holds dozens of industry recognized certificates such as CISSP, MCSE, C|EH, CIFI, and CGSP.

  • Eric Schwake
    Eric Schwake
    Senior Manager of Cybersecurity Strategy
    Menlo Security

    Eric Schwake is Sr Manager of Cybersecurity Strategy at Menlo Security. Before coming to Menlo, Eric worked with the security products at Proofpoint, Cisco and Symantek. Eric has over 17 years of information security experience with a range of positions from Technical Support to Sales to Product Marketing. Eric holds a CISSP certification.

  • Becky Bracken
    Becky Bracken
    Editor
    Dark Reading

    Becky Bracken is a veteran journalist covering cybersecurity for Dark Reading.

Sponsored By