How to Stop Salt Typhoon at the Network Layer
Maurice Stebila
Former CISO
General Motors, HARMAN, EDS
Craig Riddell
VP of Technology and Field CISO
Kron Technologies
What You Will Learn
- Why legacy NAC leaves blind spots once attackers are inside the network
- How Salt Typhoon attackers exploited SSH key sprawl and implicit trust
- How to extend zero trust and least privilege to routers, switches, and firewalls
- How to gain identity-aware visibility into every privileged session

Modern Threat Reality
How advanced actors like Salt Typhoon leverage credential reuse, SSH key sprawl, and implicit trust in network infrastructure.

Limits of Legacy NAC
Why posture checks and point-of-entry controls alone fail to protect against lateral movement and insider misuse.

Enterprise Lessons Learned
What global organizations are doing to close identity gaps, eliminate shared accounts, and pass increasingly technical audits.

Next-Generation Network PAM
How identity-aware, agentless controls extend zero trust to routers, switches, and firewalls with session visibility and accountability.
If you own network access, this session shows how to stop Salt Typhoon where NAC can’t.
Ready to Secure Your Network Infrastructure?
Don't miss this exclusive session. Register now to learn how Kron Network PAM can protect your organization from modern infrastructure attacks.