• Log In
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Overview
  • Get Started
    • How to get started
    • Create a site (e-portfolio)
    • Create digital identity (PDF)
    • PRO course checkpoints
  • Earn Points
    • PRO points calendar
    • Points table
    • Point earning examples
      • Josie Smith, freshman
      • Mary Jones, transfer
    • Request points
    • Requirements
      • e-portfolios
      • Work experience
      • External challenges, competitions, and events
      • Class project
      • Research project
      • Study abroad
      • Full-time job offer
      • Register as an alum
      • See all
  • Track
    • Professional Achievement Dashboard
    • Badges
    • Peer Analysis
    • Graduation Analysis
    • Certificates
  • Redeem
    • PRO Store
  • FAQ
  • PRO Search
  • Help

Professional Achievement Program

The Fox MIS Professional Achievement Program

Who’s In Your Cloud? How Privileged Access Controls are Leaving You Exposed – Webinar

Calendar
Register
Add to Calendar
  • Add to Timely Calendar
  • Add to Google
  • Add to Outlook
  • Add to Apple Calendar
  • Add to other calendar
  • Export to XML
When:
April 7, 2020 @ 12:00 pm – 1:00 pm America/New York Timezone
2020-04-07T12:00:00-04:00
2020-04-07T13:00:00-04:00
Cost:
Free
20 points Point Opportunity
webinar
Managing who has access to your cloud environment is mission-critical for IT security. Compliance is putting pressure on how organizations manage privileged access on these systems, which are storing petabytes of user and customer data.
Unfortunately, the nature of Linux makes it very hard to understand who is in your cloud at any given moment, resulting in breach detection times of over 200 days. Legacy solutions for privileged access management (PAM), designed to address this problem on Windows, completely neglect the Linux platform and leave you exposed.
Join Cmd’s Head of Security, John Brunn, to learn the nature of these failures, why it’s so difficult to understand and locate who is in your cloud, and how to fix it.
You will learn:
• How to assess your gaps in user attribution and compliance on Linux
• Why requirements for PAM on Linux are different than Windows
• What a PAM solution for Linux should be designed to do
• How to execute a smart PAM strategy in your Linux cloud
John Brunn
Head of Security
Cmd
John has over 20 years of infosec experience and is currently head of security at Cmd. Settling in San Francisco in 2000, he has run security teams at retail and travel e-commerce companies, as well as a mobile security startup.

Primary Sidebar

Current students

  • Create a site (e-portfolio)
  • Create digital identity (PDF)
  • Course checkpoints
  • Get help

PRO Points Calendar

Aug
10
Wed
4:30 pm Opportunity Knocks: Developing Y...
Opportunity Knocks: Developing Y...
Aug 10 @ 4:30 pm – 6:00 pm
Join The Conversation August 10, 2022 4:30-6pm Zoom Video Conferencing Making a good impression while virtual can present unique challenges. Learn how you can highlight your skills to employers and leave an impression. RSVP To:[...]
Sep
21
Wed
8:00 am IT Career Fair
IT Career Fair
Sep 21 @ 8:00 am – 4:00 pm
Please join us on Wednesday, Sept. 21, 2022 for our annual IT Career Fair. More information coming soon!
Dec
3
Sat
10:00 am AWS Discovery Day – An official ...
AWS Discovery Day – An official ...
Dec 3 @ 10:00 am – 12:30 pm
Expand your AWS capabilities and build stronger teams! The AWS Discovery Day is a complimentary Instructor-led Virtual Master Class that is designed to provide an official introduction of AWS cloud computing concepts to business leaders[...]
View Calendar
Add
  • Add to Timely Calendar
  • Add to Google
  • Add to Outlook
  • Add to Apple Calendar
  • Add to other calendar
  • Export to XML

Copyright © 2022 Department of Management Information Systems · Fox School of Business · Temple University