What’s broken in asset management and privileged access?
IT and security teams spend significant amounts of time identifying privileged users, and even more, time figuring out everything a privileged user has access to.
In this webinar, JD Sherry of Remediant and Noah Simon of Axonius discuss commonalities between cybersecurity asset management and privileged access. This webinar covers:
JD Sherry, Chief Strategy Officer, Remediant
JD Sherry, Chief Strategy Officer, is a seasoned technology executive and is responsible for providing vision and awareness regarding the latest trends in cyber security, risk and compliance. Well-versed in enterprise security and data center architecture, as a former practitioner and CEO, JD has successfully implemented large-scale public, private and hybrid clouds emphasizing security architecture best practices to meet strict compliance standards.
Noah Simon, Director of Product Marketing, Axonius
Noah Simon is Director of Product Marketing at Axonius. Noah is passionate about cybersecurity, and always seeking to understand how new technologies can help companies and individuals protect themselves from the continually evolving risk landscape. Noah has previously held product marketing roles at BitSight, Cybereason, and White Ops.