Presentation: Adaptive Authentication, a Key Ingredient to Protecting Your Secret Sauce
Speaker: Rick Handley, CISSP and Data Security Manager for Schlumberger
Abstract: Your secret sauce. Which users should have access to your secret sauce? How do you know it’s really them? How well do they take of care their identity? What device are they using? Where are they connecting from? How can you answer all of these questions with a fair amount of certainty, protect your sauce and not drive users crazy in the process.
The answer is through Adaptive Authentication. In this session you’ll get a basic understanding of Adaptive Authentication and how Microsoft makes it available through Conditional Access. You’ll also learn why Adaptive Authentication is a necessity for implementing any flavor of Zero Trust.
|Bio:||Rick Handley, CISSP and Data Security Manager for Schlumberger has been an Information Security practitioner for over 20 years. Previous roles at Schlumberger include Cameron Integration Security Manager and Endpoint Security Manager. Prior to Schlumberger he was Director of Network Security and Integration for Smith International. Rick has been a speaker at multiple ISSA events, the Houston InfraGard Oil & Gas SIG, and IBM’s Focus Conference in Las Vegas. Rick is currently Treasurer for South Texas ISSA having served on the board since 2012, Rick is also the Chairman of the Board for the non-profit Hope for Burundi which equips widows and orphans to build their own businesses.|
|Title:||CISSP and Data Security Manager for Schlumberger|
Nozomi Networks is accelerating the pace of digital transformation by pioneering innovation for industrial cyber security and operational control. We make it possible to tackle escalating cyber risks to operational networks. Nozomi Networks delivers OT visibility, threat detection and insight to thousands of the largest critical infrastructure sites around the world.
|Title:||Senior Manager, Partner Marketing|
|Title:||Senior Director WW Channels|
Luncheon Meeting Schedule:
|11:15 a.m.||Registration / Networking|
|11:30 a.m.||Luncheon / Networking|
|11:45 a.m.||Chapter Business Meeting|
|12:00 noon||Keynote Presentation|
|1:00 p.m.||Adjourn Luncheon|
- An interest in information security.
- 1 CPE