47 min

Tech Corner with Carolyn Crandall, Chief Security Advocate at Attivo Networks The CyberHub Podcast

    • Tech News

Topic: Securing Active Directory


Carolyn Crandall, Chief Security Advocate


Carolyn Crandall joins the show this week to talk about how Active directory has long been ignored and needs the attention of the security professional especially with the recent cybersecurity events that’s taken place. Our adversaries target Active Directory and with the move to Azure Active Directory we have created voids that create greater challenges for practitioners. Carolyn shares best practices and tips


Guest Bio:


Carolyn Crandall is the Chief Security Advocate at Attivo Networks, the leader in preventing identity privilege escalation and detecting lateral movement attacks. She has worked in high-tech for over 30 years and has been recognized as a top 100 women in cybersecurity, a guest on Fox News, and profiled in the Mercury News. She is an active speaker on security innovation at CISO forums, industry events, and technology education webinars. Carolyn contributes regularly to Dark Reading and SCMagazine and co-authored the book Deception-Based Threat Detection: Shifting Power to the Defenders.


 


Connect with Carolyn: https://www.linkedin.com/in/cacrandall/


 


Tech Corner is supported by these great partners please make sure to check them out:


KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub 


Whistic: www.whistic.com/cyberhub


Attivo Networks: www.attivonetworks.com


 


CISOTalk Webinar Series: Modernizing the Vendor Risk Management with Airbnb and Whistic Webinar on May 25th, 2021 register here: https://zoom.us/webinar/register/WN_Frugj1ehRbOa3v05tTP7Qw


 


CISOTalk Paisley Shirt Challenge Donate now to support the wounded warrior project and get James to wear an ugly paisley shirt for one or all of his shows: https://tiltify.com/@cisotalk/ciso-talk-paisley-shirt-challenge


 


“The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine


****


Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Tech Town Square, Other Side of Cyber and CISOs Secrets


James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/


James on Parler: @realjamesazar


Telegram: CyberHub Podcast


******


Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter


******


Website: https://www.cyberhubpodcast.com


Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw


Facebook: https://www.facebook.com/CyberHubpodcast/


Linkedin: https://www.linkedin.com/company/cyberhubpodcast/


Twitter: https://twitter.com/cyberhubpodcast


Instagram: https://www.instagram.com/cyberhubpodcast


Listen here: https://linktr.ee/cyberhubpodcast


 


The Hub of the Infosec Community.


Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Topic: Securing Active Directory


Carolyn Crandall, Chief Security Advocate


Carolyn Crandall joins the show this week to talk about how Active directory has long been ignored and needs the attention of the security professional especially with the recent cybersecurity events that’s taken place. Our adversaries target Active Directory and with the move to Azure Active Directory we have created voids that create greater challenges for practitioners. Carolyn shares best practices and tips


Guest Bio:


Carolyn Crandall is the Chief Security Advocate at Attivo Networks, the leader in preventing identity privilege escalation and detecting lateral movement attacks. She has worked in high-tech for over 30 years and has been recognized as a top 100 women in cybersecurity, a guest on Fox News, and profiled in the Mercury News. She is an active speaker on security innovation at CISO forums, industry events, and technology education webinars. Carolyn contributes regularly to Dark Reading and SCMagazine and co-authored the book Deception-Based Threat Detection: Shifting Power to the Defenders.


 


Connect with Carolyn: https://www.linkedin.com/in/cacrandall/


 


Tech Corner is supported by these great partners please make sure to check them out:


KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub 


Whistic: www.whistic.com/cyberhub


Attivo Networks: www.attivonetworks.com


 


CISOTalk Webinar Series: Modernizing the Vendor Risk Management with Airbnb and Whistic Webinar on May 25th, 2021 register here: https://zoom.us/webinar/register/WN_Frugj1ehRbOa3v05tTP7Qw


 


CISOTalk Paisley Shirt Challenge Donate now to support the wounded warrior project and get James to wear an ugly paisley shirt for one or all of his shows: https://tiltify.com/@cisotalk/ciso-talk-paisley-shirt-challenge


 


“The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine


****


Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Tech Town Square, Other Side of Cyber and CISOs Secrets


James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/


James on Parler: @realjamesazar


Telegram: CyberHub Podcast


******


Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter


******


Website: https://www.cyberhubpodcast.com


Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw


Facebook: https://www.facebook.com/CyberHubpodcast/


Linkedin: https://www.linkedin.com/company/cyberhubpodcast/


Twitter: https://twitter.com/cyberhubpodcast


Instagram: https://www.instagram.com/cyberhubpodcast


Listen here: https://linktr.ee/cyberhubpodcast


 


The Hub of the Infosec Community.


Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

47 min