Dealing with the threats from insiders who have administrative privilege in your systems is a challenge enough, but how do you handle the risk that comes from vendors and other third parties such as contractors who need privileged access? These are usually trusted vendors and have undergone some vetting but it isn't usually as rigorous as your internal processes and your visibility into their employee’s background and activities within your systems can be opaque. We will go over why this kind of access represents an outsized risk to security and compliance, the challenges of managing these “Inside-Outsiders” and give some best practices to make sure that their access is as secure, compliant and efficient as your internal employees.
About Tony Howlett:
Tony Howlett is a published author and speaker on various security, compliance, and
technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board
Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP, GNSA
certifications, and a B.B.A in Management Information Systems. He has previously served at
CTO for Codero, a managed cloud hosting provider and CTO of Network Security Services, a
security and compliance consulting firm, as well as founding InfoHighway Communications, one
of the nation’s first high speed internet access providers. Tony is currently the CISO at
SecureLink.