Hi [[ session.user.profile.firstName ]]

3 Key Steps to PAM Maturity

Join us for an insightful discussion about privileged access management with Terence Jackson, Terence graduated from Howard University with a degree in Management Information Systems. He is currently the Chief Information Security Officer at Thycotic Software. His responsibilities include protecting the organizations information assets and managing enterprise risk. He has over 17 years’ experience working in information technology and security for large and small federal contractors and as an independent consultant. Terence is also a Stars Mentor at MACH37, a Virginia-based cybersecurity accelerator. In his free time, Terence serves on the AV and Social Media Ministry at his church. He enjoys spending time with his wife and family, which includes his teenage son and six-year-old daughter. He’s also an avid Marvel movie watcher and enjoys technology news and research. Terence is an industry-acknowledged expert and public speaker and is regularly invited to speak and share his insights by some of the largest and most respected organizations in the world including Forbes, Dark Reading, BrightTalk, SC Magazine, InfoSec Magazine, Tech News World, The Guardian and Spectrum News. He was also featured in the Wiley published book “Tribe of Hackers”.
Recorded Nov 12 2019 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Terence Jackson, CISO at Thycotic
Presentation preview: 3 Key Steps to PAM Maturity

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
For cybersecurity professionals managing complex business ecosystems
Developed for professionals looking to quantify and maintain visibility of their cyber risk exposure, Black Kite offers expert insight that covers the entirety of the third party risk management lifecycle.

Follow along as we discuss everything from cyber risk quantification and the importance of standards-based methodologies, to the Open FAIR™ model and calculating the potential financial impact of a cyber breach.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 3 Key Steps to PAM Maturity
  • Live at: Nov 12 2019 4:00 pm
  • Presented by: Terence Jackson, CISO at Thycotic
  • From:
Your email has been sent.
or close