Securing Access for Privileged Insiders and Vendors

Sam Elliott of Bomgar: 'We Often Forget about the Basics'
Sam Elliott, director of security product management, Bomgar

Securing access pathways is just as critical as securing user credentials, says Sam Elliott of Bomgar, who points out that too many organizations overlook some fundamental steps.

See Also: Live Webinar | Navigating Identity Threats: Detection & Response Strategies for Modern Security Challenges

In a video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Lewin discusses:

  • How access security can improve business productivity;
  • The six steps of securing access; and
  • Why privileged-access controls still seem so daunting to so many companies.

At Bomgar, Elliott leads a team of product managers responsible for developing strategy and defining, managing and launching new cybersecurity product suites and offerings. Previously, Elliott held similar positions at BMC Software and Numara Software.


About the Author

Tracy Kitten

Tracy Kitten

Former Director of Global Events Content and Executive Editor, BankInfoSecurity & CUInfoSecurity

Kitten was director of global events content and an executive editor at ISMG. A veteran journalist with more than 20 years of experience, she covered the financial sector for over 10 years. Before joining Information Security Media Group in 2010, she covered the financial self-service industry as the senior editor of ATMmarketplace, part of Networld Media. Kitten has been a regular speaker at domestic and international conferences, and was the keynote at ATMIA's U.S. and Canadian conferences in 2009. She has been quoted by CNN.com, ABC News, Bankrate.com and MSN Money.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.