Governance & Risk Management , Identity Governance & Administration , Privacy

Zero Standing Privilege: How to Achieve it

Remediant's Tim Keeler on How to Improve Defense of Privileged Accounts
Tim Keeler, Founder & CEO, Remediant

Increasingly, cyber attacks are taking advantage of privileged accounts, and traditional PAM controls are not enough to defend against them. Tim Keeler of Remediant discusses the role of Zero Standing Privilege and just-in-time privileged account defense

In a video interview with Information Security Media Group, Keeler, founder and CEO of Remediant, talks about:

  • Cyber attacks on privileged accounts;
  • Vulnerabilities in traditional PAM approaches;
  • Zero Standing Privilege and just-in-time defense.

Keeler, Founder and CEO, worked at Genentech/Roche from 2000 to 2012 and was a leader on the Security Incident Response Team. After this experience, Keeler moved deeper into the Enterprise Security realm, leaving Roche in 2012 to focus on security consulting. His clients included UCSF, Genentech/Roche, Gilead Sciences and CardioDX. He is a GX-certified Security Incident Handler and earned his GX Security Leadership Certification (GSLC) from GIAC. Tim holds US Department of Defense Level 3 8750 IAT and 8750 IAM Management certifications; CHFI (Computer Hacking Forensic Investigator) from EC Council and a certification as a CCFE (Certified Computer Forensics Examiner) from IACRB. Keeler was published in the eForensics Magazine in 2013.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.