Donald E. Hester
Credentials, the Keys to the Kingdom
On August 30th, I was honored to be the keynote speaker at a lunch and learn event organized by Proofpoint Inc. in Palo Alto, California. The presentation focused on shedding light on how threat actors employ credentials within the cyber kill chain, underlining the pivotal role of credential management. I also delved into CISA's cyber performance goals (CPG) and described the specific controls pertaining to credentials. Following this insightful session, Proofpoint, Inc. representatives Madison Beane and Mark Morgan took the floor to discuss a Proofpoint solution. The luncheon drew participation from a distinguished gathering of 30 cybersecurity leaders from the heart of Silicon Valley. Below are brief notes on my presentation.