Join speaker Ron Pelletier of Pondurance for the next Technology & Security Management HappyHour on March 23rd!
Description: Pondurance predicts that domain controller compromises will become one of the primary focus areas for improving security in 2021. When monitoring assets, the domain controller is one of the most critical.
Join Pondurance founder and Chief Customer Officer, Ron Pelletier, to discuss large scale compromises accomplished through gaining access to an organization’s domain controller. In this session, he will discuss:
- Domain controller compromises and their impacts
- Common techniques that attackers used to gain access
- The best security hygiene to put in place for prevention of an attack
You will learn:
- What the future of endpoint management looks like in the new normal.
- How to bridge the gap between IT and Cybersecurity by using AI and NLP.
- How to fill the cybersecurity hiring gap while making your enterprise environment more secure.
Speaker: Ron Pelletier is the original Founder of Pondurance, having started the company from his basement in 2008. Ron has over 25 years of cyber security advisory experience. He started his career as an officer in the US Army, followed by nine years with Big Four firm, EY. As a strong consensus builder and customer advocate, Ron is focused on evangelizing the Pondurance brand as well as customer success.
Technology & Security Management Happy Hour is a Peer-to-Peer Roundtable in “Happy Hour Format”
Peer-to-Peer Roundtables are educational / networking events where we come together to discuss IT security challenges and solutions. As a diverse community, our various backgrounds and areas of expertise become an asset in navigating the complex issues we face in an ever more digitally dependent environment.
Our Peer-to-Peer Happy Hour series is ‘after-hours,’ offering a less formal structure for conversation and connection than our traditional Roundtable series. We hope you’ll join us!
- Deal with real issues
- Solve real problems
- Have fun
- Build community
- Technology executives
- CIOs, Directors of IT
- CISOs, Information Security Managers
- CFOs and other executives that manage IT