LIVE Webinar, Featuring KeyData's Chief Technology Officer
The Sophos State of Ransomware in Government 2021 report revealed that the average bill for rectifying a ransomware attack, considering downtime, people time, device cost, network cost, lost opportunity, ransom paid, and more, was US$1.37 million, globally.
And with the increase in the severity and frequency of ransomware attacks on government entities, you will hear from and engage with KeyData's CTO, Brian Read, during a 30-minute live webinar where he will share the importance of having identity controls in place for an effective Privileged Access Management (PAM) program.
Featuring guest speaker: Brian Read, CTO, KeyData Associates
The state of ransomware in government comes with increased challenges:
REGISTER TO JOIN US to learn how you can overcome these issues, meet your strategic objectives, and choose the best of breed identity services and solution.
About Brian Read
Brian’s extensive experience in the Canadian IT Industry has led to the development of a broad skill set. With over 20 years focused on managing and growing security consulting practices, Brian has led large Canadian InfoSec projects in the Federal Public Sector, Energy Industry and Financial Services Sector.
Since joining KeyData as the CTO, Brian provides a technical voice to the KeyData senior leadership team. This position also allows Brian to work with strategic customers on tasks that may include everything from helping them reshape their strategies aroundiIdentity in the public cloud to developing custom automation and product integrations in several programming languages.
His unique experience as both a defender and an attacker has allowed him opportunities to speak at events from ISACA, ISF, SecTor, EDIST and MISA among others.
KeyData has been delivering Identity and Access Management (IAM) services since 2005. With deep technical and governance expertise in all aspects of IAM, KeyData is a trusted advisor to clients large and small, guiding them through IAM strategy, governance, processes redesign, role-based access control (RBAC), technology selection and implementation, as well as IAM managed services and training.