Securing Access for Privileged Insiders and Vendors

Sam Elliott of Bomgar: 'We Often Forget about the Basics'
Sam Elliott, director of security product management, Bomgar

Securing access pathways is just as critical as securing user credentials, says Sam Elliott of Bomgar, who points out that too many organizations overlook some fundamental steps.

See Also: How to Scale Your Vendor Risk Management Program

In a video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Lewin discusses:

  • How access security can improve business productivity;
  • The six steps of securing access; and
  • Why privileged-access controls still seem so daunting to so many companies.

At Bomgar, Elliott leads a team of product managers responsible for developing strategy and defining, managing and launching new cybersecurity product suites and offerings. Previously, Elliott held similar positions at BMC Software and Numara Software.


About the Author

Tracy Kitten

Tracy Kitten

Director of Global Events Content and Executive Editor, BankInfoSecurity & CUInfoSecurity

A veteran journalist with more than 20 years' experience, Kitten has covered the financial sector for the last 13 years. Before joining Information Security Media Group in 2010, where she now serves as director of global events content and executive editor of BankInfoSecurity and CUInfoSecurity, she covered the financial self-service industry as the senior editor of ATMmarketplace, part of Networld Media. Kitten has been a regular speaker at domestic and international conferences, and was the keynote at ATMIA's U.S. and Canadian conferences in 2009. She has been quoted by CNN.com, ABC News, Bankrate.com and MSN Money.




Around the Network