CDM-CYBER-DEFENSE-eMAGAZINE-March-2019
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Before you start implementing next-generation Endpoint Protection Platforms (EPP) or complex<br />
Endpoint Discovery and Remediation solutions (EDRs), you should consider a least privilege<br />
strategy with application control solution. Proactive protection based on least privilege means less<br />
time and resources spent detecting an infection, chasing down hackers once they’ve already<br />
entered your network, and remediating the damage.<br />
About the Author<br />
Joseph Carson is the Chief Security Scientist at Thycotic. Joseph is<br />
responsible for cybersecurity research in the privileged access<br />
management industry accelerating Thycotic innovation and<br />
leadership positions. He is a cyber security professional and ethical<br />
hacker with more than 25 years’ experience in enterprise security<br />
specializing in block chain, endpoint security, application security &<br />
virtualization and privileged access management. Prior to joining<br />
Thycotic Joseph worked on innovative block chain solutions at<br />
Guard time and spent more than 10 years in leadership roles at both<br />
Altiris and Symantec and Arellia. He is a Certified Information<br />
Systems Security Professional (CISSP) and an active member of<br />
the cyber security community frequently speaking at cybersecurity<br />
conferences globally.