Art Chaisiriwatanasai

Art Chaisiriwatanasai

Greater Chicago Area
3K followers 500+ connections

About

Proud servant leader within the Information Security Team at Paylocity, one of the…

Activity

Join now to see all activity

Experience

Education

  • DePaul University Graphic

    DePaul University

    -

    Activities and Societies: DePaul Class of 2005 Commencement Speaker, Alpha Kappa Psi, College Academic Bowl, National Society of Collegiate Scholars, Computer Science Society, Delta Upsilon Pi Epsilon Computing Honor Society, Dodgeball Society

Licenses & Certifications

Publications

  • Deploying Privileged Access Management Solutions

    KPMG

    This whitepaper urges organizations to take control of their administrators through privileged access management (PAM) in light of recent breaches and insider threats.

    The piece also offers KPMG’s approach to getting started with PAM in an organization’s environment and provides a high level roadmap for possible deployments options. An effective solution requires an integrated approach across people, processes, and technology, with defined business, function, and technical requirements.…

    This whitepaper urges organizations to take control of their administrators through privileged access management (PAM) in light of recent breaches and insider threats.

    The piece also offers KPMG’s approach to getting started with PAM in an organization’s environment and provides a high level roadmap for possible deployments options. An effective solution requires an integrated approach across people, processes, and technology, with defined business, function, and technical requirements.

    See publication
  • Security Operations Center Globalization

    KPMG

    Important factors to consider when centralizing security services and monitoring environment for your organization.

    Other authors
    See publication
  • Top 5 Reasons Incident Response is Failing

    KPMG (kpmg.com)

    Whitepaper examining the challenges faced by an incident response function and reasons for failures in the incident response process.

    Other authors
    See publication
  • Enhanced Vulnerability Management Process

    KPMG

    Organizations are finding it increasingly difficult to build robust vulnerability management programs due to the overwhelming number of assets, vulnerabilities, and system configurations in their environment. Valuable man-hours are being spent on tool upkeep and chasing down system owners rather than mitigating vulnerabilities or configuration issues. Enhancing the vulnerability management process not only automates these arduous tasks, but also helps to prioritize remediation efforts, creating…

    Organizations are finding it increasingly difficult to build robust vulnerability management programs due to the overwhelming number of assets, vulnerabilities, and system configurations in their environment. Valuable man-hours are being spent on tool upkeep and chasing down system owners rather than mitigating vulnerabilities or configuration issues. Enhancing the vulnerability management process not only automates these arduous tasks, but also helps to prioritize remediation efforts, creating a more effective and comprehensive vulnerability management program. The result of this method of thinking allows your security team to focus their efforts on the issues with the highest business risk and create meaningful metrics to demonstrate a reduction of risk in the environment.

    Other authors
    See publication

More activity by Art

View Art’s full profile

  • See who you know in common
  • Get introduced
  • Contact Art directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses