Session: Defending Critical Infrastructure From Cyberattacks
SESSION QUICK ABSTART: The session will review security designs and controls, along with best practices to help to prevent a cyberattack.
SESSION ABSTRACT: The security designs for critical infrastructure that includes Defense-in-Depth, Zero Trust strategies all to keep critical infrastructure like Active Directory, the keys to the kingdom secure.
- Security strategies clearly defined and how they can be used together to reduce attack vectors in an environment
- Security strategies: examples
- Critical infrastructure - closing known default configuration gaps & configurations settings to review
- Steps to take to reduce the attack vectors
Alexandra has twenty years’ experience supporting Active Directory in a wide variety of organizations, from government to some of the world's best-known companies. After 8 years supporting the Bureau of Land Management's Active Directory, she moved to Intel to support their worldwide corporate and manufacturing forests. After some time in financial services IT, she moved to Nike where she also supported their worldwide production forest.
Her experience has included merger & acquisition projects where she migrated newly acquired companies into an existing Active Directory infrastructure, an Identity and Access Management implementation & migration project, upgrading domain controllers and associated downstream dependent applications and providing Active Directory support. Active Directory is Alexandra’s first tech passion, and she enjoys deep diving into it as associated technologies continue to evolve.