Access Management , Cloud Security , Identity & Access Management

Access Management: A Strategy for Success

Sam Elliott of Bomgar on Key Steps to Take
Sam Elliott, director of security product management, Bomgar

Privileged access management is a hot topic in security today because so many data breaches occur as a result of compromised credentials, says Sam Elliott of Bomgar.

See Also: Wipro, AWS Team Up to Address Compliance in the Cloud Era

"Infosec pros have really adopted the attitude and assume that threat actors are already in ... and they are taking steps on how they can solve for that," Elliott says.

In a video interview at Information Security Media Group's recent New York Fraud and Breach Summit, Elliott, who was a featured speaker, also discusses:

  • The common access-related vulnerabilities;
  • Steps to gain control over privileged access;
  • Why managing vendor access should be your first step.

Elliott is director of security product management with Bomgar. Previously, he held positions at BMC Software and Numara Software.


About the Author

Joan Goodchild

Joan Goodchild

Director of Multimedia Content, ISMG

Joan Goodchild is veteran writer and editor who has been covering security for more than a decade. Before joining ISMG, she was the editor-in-chief of CSO, where she led the team to several national awards, including an AZBEE (ASPBE) for website of the year and several Digital Eddie (Folio) awards for B2B website of the year. Her previous experience in business journalism includes roles as a broadcast and web editor with the Boston Business Journal and as a news writer covering the Windows OS with TechTarget. Prior to that, she worked as a television reporter and anchor for more than a decade. She has a master's degree in journalism from Northwestern University's Medill School of Journalism and is the recipient of an Edward R. Murrow award for investigative reporting.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.