Watch On-Demand

How to Stop Salt Typhoon at the Network Layer

Maurice Stebila

Former CISO
General Motors, HARMAN, EDS

Craig Riddell

VP of Technology and Field CISO
Kron Technologies

What You Will Learn
  • Why legacy NAC leaves blind spots once attackers are inside the network
  • How Salt Typhoon attackers exploited SSH key sprawl and implicit trust
  • How to extend zero trust and least privilege to routers, switches, and firewalls
  • How to gain identity-aware visibility into every privileged session

Watch Now

Oops! Something went wrong while submitting the form.

Meet Your Speakers

Craig Riddell

Vice President of Technology and Field CISO, Americas

Craig Riddell is Vice President of Technology and Field CISO, Americas at Kron Technologies. A recognized cybersecurity leader with 15+ years of experience in identity and access management (IAM), privileged access security, and Zero Trust, Craig has helped global enterprises secure critical infrastructure and reduce risk.

He’s a CISSP and Certified Ethical Hacker, known for bridging technical security and business strategy to help organizations strengthen their security posture and drive growth.

CISSP

Certified ethical Hacker

15+ Years Experience

Meet Your Speakers

Maurice Stebila

Vice President of Technology and Former CISO, Americas

Maurice Stebila is a globally recognized Chief Information Security Officer with more than 20 years of leadership across automotive, manufacturing, and financial services. He has guided digital transformation and risk management initiatives for some of the world’s largest enterprises, including Harman International, Samsung, GM, HP, and EDS.

Known as a frequent keynote speaker and thought leader across multiple global forums and events, Maurice brings a practitioner’s lens to zero trust, network resilience, and compliance at scale.

CISSP

Global Cybersecurity Leader

20+ Years Experience

Modern Threat Reality

How advanced actors like Salt Typhoon leverage credential reuse, SSH key sprawl, and implicit trust in network infrastructure.

Limits of Legacy NAC

Why posture checks and point-of-entry controls alone fail to protect against lateral movement and insider misuse.

Enterprise Lessons Learned

What global organizations are doing to close identity gaps, eliminate shared accounts, and pass increasingly technical audits.

Next-Generation Network PAM

How identity-aware, agentless controls extend zero trust to routers, switches, and firewalls with session visibility and accountability.

If you own network access, this session shows how to stop Salt Typhoon where NAC can’t.

Ready to Secure Your Network Infrastructure?

Don't miss this exclusive session. Register now to learn how Kron Network PAM can protect your organization from modern infrastructure attacks.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.