01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Before you start implementing next-generation Endpoint Protection Platforms (EPP) or complex<br />

Endpoint Discovery and Remediation solutions (EDRs), you should consider a least privilege<br />

strategy with application control solution. Proactive protection based on least privilege means less<br />

time and resources spent detecting an infection, chasing down hackers once they’ve already<br />

entered your network, and remediating the damage.<br />

About the Author<br />

Joseph Carson is the Chief Security Scientist at Thycotic. Joseph is<br />

responsible for cybersecurity research in the privileged access<br />

management industry accelerating Thycotic innovation and<br />

leadership positions. He is a cyber security professional and ethical<br />

hacker with more than 25 years’ experience in enterprise security<br />

specializing in block chain, endpoint security, application security &<br />

virtualization and privileged access management. Prior to joining<br />

Thycotic Joseph worked on innovative block chain solutions at<br />

Guard time and spent more than 10 years in leadership roles at both<br />

Altiris and Symantec and Arellia. He is a Certified Information<br />

Systems Security Professional (CISSP) and an active member of<br />

the cyber security community frequently speaking at cybersecurity<br />

conferences globally.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!