SlideShare a Scribd company logo
Privileged Access Management
(PAM): Multi-Factor Authentication in
Privileged Access Management
In the ever-evolving landscape of cybersecurity, safeguarding sensitive data
and critical systems has become paramount. As cyber threats grow in
sophistication, organizations are constantly seeking innovative methods to
fortify their defenses. Multi-Factor Authentication (MFA) stands out as a potent
tool within the security arsenal, particularly when integrated with Privileged
Access Management (PAM). This presentation explores the importance of MFA
in PAM and how it enhances overall security posture.
Bert Blevins
https://bertblevins.com/
27-06-2024
Understanding Privileged Access
Management
1 Definition
Privileged access management
encompasses methods,
protocols, and tools to regulate
and monitor access to
privileged accounts within an
organization.
2 Elevated Privileges
These accounts enable users to
execute vital operations such as
system configuration, access to
sensitive data, and
management of network
infrastructure.
3 Security Risk
If these privileges fall into the wrong hands, they pose a significant security
risk to the organization.
The Significance of Multi-Factor Authentication
Additional Protection
MFA adds an extra layer of
security by requiring users to
provide multiple forms of
verification before gaining access
to a system or application.
Multiple Factors
MFA incorporates factors such as
something the user knows (like a
password), something they
possess (such as a security
token or smartphone), and
something inherent to their
identity (like biometric
information).
Enhanced Security
MFA diminishes the likelihood of
unauthorized access to
privileged accounts, even if a
hacker obtains a user's
password through phishing or
other means.
Bert Blevins
https://bertblevins.com/
Biometric Verification in MFA
Unique Physical
Characteristics
Biometric authentication utilizes
unique physical characteristics like
fingerprints or facial recognition for
verification.
Added Security Layer
Biometrics provide an additional
layer of security in privileged
access authentication.
Difficult to Replicate
The difficulty in replicating biometric data makes it an effective form of
authentication.
Passwords in Multi-Factor Authentication
1 One Factor
Passwords constitute one
factor in MFA but are
insufficient alone for robust
security.
2 Stringent Policies
Enforcing stringent
password policies, such as
using complex, unique
passwords for each
account, is imperative.
3 Regular Changes
Regularly changing
passwords is an important
part of maintaining security
in MFA systems.
Bert Blevins
https://bertblevins.com/
Security Tokens in MFA
Physical Objects
Security tokens, also known as
smart cards, are physical
objects integral to the login
process.
Authentication Credentials
These tokens generate or
store authentication
credentials for secure access.
Enhanced Security
Security tokens enhance
security by requiring users to
possess both the physical
device and their password.
Bert Blevins
https://bertblevins.com/
One-Time Passcodes (OTP) in MFA
1
Generation
OTPs are temporary codes generated by a
token or authentication app.
2 Usage
These codes must be entered along with
the password to complete the
authentication process.
3
Delivery
OTPs are especially effective when
delivered via out-of-band methods like SMS
or mobile apps. 4 Expiration
OTPs are typically valid for a short period,
enhancing security.
Bert Blevins
https://bertblevins.com/
Implementing MFA in PAM: Integration
Seamless Integration
MFA systems should
seamlessly integrate with
existing PAM platforms for
centralized control.
Uniform Enforcement
Integration enables
administrators to uniformly
enforce MFA policies across all
privileged accounts.
Centralized Oversight
Integrated systems provide
comprehensive oversight of
privileged access within the
organization.
Bert Blevins
https://bertblevins.com/
Implementing MFA in PAM: Scalability and
Flexibility
1 Adaptability
MFA systems must be
adaptable to accommodate
evolving security
requirements as
organizations expand.
2 New Technologies
Systems should support
new authentication
technologies to stay current
with security trends.
3 User Base Growth
MFA solutions must scale to
meet the needs of growing
user bases within the
organization.
Bert Blevins
https://bertblevins.com/
Implementing MFA in PAM: Continuous
Monitoring
1
Vigilant Monitoring
Continuous monitoring of user
behavior and authentication logs is
essential.
2
Suspicious Activity Detection
Monitoring enables the detection of
suspicious activity and potential
security breaches.
3
Data Analysis
Analyzing authentication data helps
organizations enhance their MFA
policies.
4
Security Posture Improvement
Insights from monitoring contribute to
improving overall security posture.
Bert Blevins
https://bertblevins.com/
User Experience in MFA Implementation
Balance
Balancing security and usability
is essential to ensure that MFA
does not hinder productivity.
User-Friendly Methods
Organizations should opt for
user-friendly authentication
methods that offer robust
security.
Productivity
A well-implemented MFA system
enhances security without
significantly impacting user
workflow.
Bert Blevins
https://bertblevins.com/
Regulatory Compliance in MFA Selection
1 Sector-Specific
Regulations
Various sectors, such as
government, healthcare,
and finance, are subject to
stringent data security
regulations.
2 Alignment with Laws
Ensure that your chosen
MFA solution aligns with all
relevant laws and
regulations, including
GDPR, HIPAA, and PCI
DSS.
3 Compliance Verification
Regularly verify that your
MFA implementation meets
current compliance
standards.
Bert Blevins
https://bertblevins.com/
Integration Capabilities of MFA
Solutions
Existing Infrastructure
Assess how effectively MFA
solutions integrate with your
existing PAM infrastructure.
Other Authentication Systems
Consider integration with other
authentication systems used in
your organization.
Seamless Integration Benefits
Seamless integration enhances overall security posture and simplifies
centralized management.
Policy Configuration in MFA Implementation
1
Establish MFA Policies
Create MFA policies aligned with your
company's security guidelines and risk
assessment. 2 Define Authentication Frequency
Determine how often users need to
authenticate using multiple factors.
3
Set Fallback Options
Establish fallback options for users without
MFA devices.
4 Role-Based Enforcement
Define MFA enforcement for specific user
roles within the organization.
Bert Blevins
https://bertblevins.com/
User Awareness and Training for
MFA
1 Education on Best Practices
Thoroughly educate users on
MFA best practices and the
importance of safeguarding
login credentials.
2 Phishing Awareness
Train users to identify phishing
scams that may attempt to
compromise MFA security.
3 Security Culture
Cultivate a culture of security awareness to mitigate the risk of human error
in MFA usage.
Bert Blevins
https://bertblevins.com/
Continuous Monitoring and Optimization of MFA
Regular Monitoring
Continuously monitor
user behavior and
authentication records
to detect anomalies or
suspicious activity.
Data Analysis
Analyze collected data
to gain insights into
MFA effectiveness and
user patterns.
Policy Refinement
Use data insights to
refine MFA policies
and bolster overall
security posture.
Threat Response
Adapt MFA strategies
to respond to
emerging threats
identified through
monitoring.
Bert Blevins
https://bertblevins.com/
The Future of MFA in Privileged Access
Management
AI Integration
Artificial intelligence will
play a larger role in
MFA, enhancing threat
detection and adaptive
authentication.
Advanced Biometrics
More sophisticated
biometric methods will
be incorporated into
MFA systems for
increased security.
Blockchain Security
Blockchain technology
may be leveraged to
create more secure and
decentralized
authentication systems.
Cloud-Based
Solutions
Cloud-native MFA
solutions will become
more prevalent, offering
greater scalability and
flexibility.
Bert Blevins
https://bertblevins.com/
The Future of MFA in Privileged Access
Management
AI Integration
Artificial intelligence will
play a larger role in
MFA, enhancing threat
detection and adaptive
authentication.
Advanced Biometrics
More sophisticated
biometric methods will
be incorporated into
MFA systems for
increased security.
Blockchain Security
Blockchain technology
may be leveraged to
create more secure and
decentralized
authentication systems.
Cloud-Based
Solutions
Cloud-native MFA
solutions will become
more prevalent, offering
greater scalability and
flexibility.
Bert Blevins
https://bertblevins.com/
About Bert Blevins
Bert Blevins is a dedicated professional with numerous certifications and degrees.
He holds a Bachelor's in Advertising and an MBA.
Phone
832-281-0330
Email
info@incgpt.com
LinkedIn
Profile
Bert Blevins
https://bertblevins.com/

More Related Content

PPTX
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
PPTX
Exploring Multi-Factor Authentication in Privileged Access Management
PPTX
Privileged Access Management (PAM) Compliance in IT Security
PDF
Why Multi-Factor Authentication (MFA) Is Essential for Modern Account Security
PDF
Understanding User Authentication_ A Cornerstone of Cybersecurity.pdf
PPTX
The Critical Role of Privileged Access Management (PAM) in Cybersecurity Bri...
PPTX
Exploring the Depths of Privileged Access Management (PAM)
PPTX
Privileged Access Management (PAM) - NY DFS Regulation
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Exploring Multi-Factor Authentication in Privileged Access Management
Privileged Access Management (PAM) Compliance in IT Security
Why Multi-Factor Authentication (MFA) Is Essential for Modern Account Security
Understanding User Authentication_ A Cornerstone of Cybersecurity.pdf
The Critical Role of Privileged Access Management (PAM) in Cybersecurity Bri...
Exploring the Depths of Privileged Access Management (PAM)
Privileged Access Management (PAM) - NY DFS Regulation

Similar to Enhancing Security with Multi-Factor Authentication in Privileged Access Management (20)

PDF
Authentication_Best_Practices_WP(EN)_web
PPTX
Comprehensive Guide to Privileged Access Management for Remote Workers
PDF
The Importance of Multi-Factor Authentication_ Protecting What Matters Most.pdf
PPTX
What is NY DFS Regulation for PAM and MFA?
PDF
Understanding User Authentication- Methods, Importance, and Best Practices.pdf
PDF
Understanding User Authentication- The First Line of Defense in Cybersecurity...
PDF
What is Authentication in Network Security| Digitdefence
PPTX
Safeguarding Your Digital Fortress with Privileged Access Management
PDF
The Federal Information Security Management Act
PDF
Multifactor Authentication (MFA) and Its Role in CCIE Security.pdf
PPTX
Optimizing Desktop Management with Privileged Access Management (PAM)
PPTX
Exploring the Depths of Privileged Access Management
PPTX
Simplify Authentication with a Web Password Filler for PAM
PPTX
Privileged Access Management Security: Safeguarding Sensitive Information and...
PPTX
Protecting Your Company’s Most Sensitive Information with Privileged Identity...
PPTX
Safeguarding Your Digital Fortress: The Importance of Privileged Access Manag...
PPTX
Strengthening Security through Session Monitoring in Privileged Access Manage...
PPTX
Secure Access Begins with Strong Authentication
PPTX
Exploring the Depths of Privileged Access Management
PPTX
Privileged Access Management (PAM): A Deep Dive into Modern Authentication: O...
Authentication_Best_Practices_WP(EN)_web
Comprehensive Guide to Privileged Access Management for Remote Workers
The Importance of Multi-Factor Authentication_ Protecting What Matters Most.pdf
What is NY DFS Regulation for PAM and MFA?
Understanding User Authentication- Methods, Importance, and Best Practices.pdf
Understanding User Authentication- The First Line of Defense in Cybersecurity...
What is Authentication in Network Security| Digitdefence
Safeguarding Your Digital Fortress with Privileged Access Management
The Federal Information Security Management Act
Multifactor Authentication (MFA) and Its Role in CCIE Security.pdf
Optimizing Desktop Management with Privileged Access Management (PAM)
Exploring the Depths of Privileged Access Management
Simplify Authentication with a Web Password Filler for PAM
Privileged Access Management Security: Safeguarding Sensitive Information and...
Protecting Your Company’s Most Sensitive Information with Privileged Identity...
Safeguarding Your Digital Fortress: The Importance of Privileged Access Manag...
Strengthening Security through Session Monitoring in Privileged Access Manage...
Secure Access Begins with Strong Authentication
Exploring the Depths of Privileged Access Management
Privileged Access Management (PAM): A Deep Dive into Modern Authentication: O...
Ad

More from Bert Blevins (20)

PDF
Top 15 Mistakes Companies Make in Privileged.pdf
PDF
5 Activities You Should start trying.pdf
PDF
10 Types of Insider Threats and How PAM.pdf
PDF
30 Best Practices for Privileged Access Management (PAM).pdf
PDF
As artificial intelligence revolutionizes.pdf
PDF
20 Key KPI's for Managing a PAM Solution & How Delinea Delivers Insights.pdf
PDF
A new Frontier in Cybersecurity - ZTNA.pdf
PPTX
What is Privileged Access Management (PAM)?
PPTX
Best Practices for Securing Privileged Access in Organizations
PPTX
Effective Strategies for Privileged User Management (PUM) in Cybersecurity
PPTX
Enforcing Least Privilege for Enhanced Cybersecurity
PPTX
Ensuring Robust Security with Privileged Access Management (PAM)
PPTX
Establishing a Robust Privileged Access Management Policy for Enhanced Security
PPTX
Revolutionizing Business Operations with SharePoint Chatbots
PPTX
The Importance of SharePoint Online Training for Business Efficiency
PPTX
The Essential Role of a SharePoint Contractor in Business Solutions
PPTX
Enhancing Business Efficiency Through SharePoint Development
PPTX
Migrating to a New Platform for Enhanced Efficiency and Competitiveness
PPTX
Securing Cloud Access with Microsoft Azure Active Directory Password Protection
PPTX
Securing Secrets: Protecting Sensitive Data in Digital Environments
Top 15 Mistakes Companies Make in Privileged.pdf
5 Activities You Should start trying.pdf
10 Types of Insider Threats and How PAM.pdf
30 Best Practices for Privileged Access Management (PAM).pdf
As artificial intelligence revolutionizes.pdf
20 Key KPI's for Managing a PAM Solution & How Delinea Delivers Insights.pdf
A new Frontier in Cybersecurity - ZTNA.pdf
What is Privileged Access Management (PAM)?
Best Practices for Securing Privileged Access in Organizations
Effective Strategies for Privileged User Management (PUM) in Cybersecurity
Enforcing Least Privilege for Enhanced Cybersecurity
Ensuring Robust Security with Privileged Access Management (PAM)
Establishing a Robust Privileged Access Management Policy for Enhanced Security
Revolutionizing Business Operations with SharePoint Chatbots
The Importance of SharePoint Online Training for Business Efficiency
The Essential Role of a SharePoint Contractor in Business Solutions
Enhancing Business Efficiency Through SharePoint Development
Migrating to a New Platform for Enhanced Efficiency and Competitiveness
Securing Cloud Access with Microsoft Azure Active Directory Password Protection
Securing Secrets: Protecting Sensitive Data in Digital Environments
Ad

Recently uploaded (20)

PPTX
Digital Literacy And Online Safety on internet
PPTX
Introduction to Information and Communication Technology
PDF
Introduction to the IoT system, how the IoT system works
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPT
Ethics in Information System - Management Information System
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Internet___Basics___Styled_ presentation
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
Funds Management Learning Material for Beg
Digital Literacy And Online Safety on internet
Introduction to Information and Communication Technology
Introduction to the IoT system, how the IoT system works
presentation_pfe-universite-molay-seltan.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Exploring VPS Hosting Trends for SMBs in 2025
Cloud-Scale Log Monitoring _ Datadog.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Power Point - Lesson 3_2.pptx grad school presentation
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Paper PDF World Game (s) Great Redesign.pdf
international classification of diseases ICD-10 review PPT.pptx
Ethics in Information System - Management Information System
Sims 4 Historia para lo sims 4 para jugar
Internet___Basics___Styled_ presentation
An introduction to the IFRS (ISSB) Stndards.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Funds Management Learning Material for Beg

Enhancing Security with Multi-Factor Authentication in Privileged Access Management

  • 1. Privileged Access Management (PAM): Multi-Factor Authentication in Privileged Access Management In the ever-evolving landscape of cybersecurity, safeguarding sensitive data and critical systems has become paramount. As cyber threats grow in sophistication, organizations are constantly seeking innovative methods to fortify their defenses. Multi-Factor Authentication (MFA) stands out as a potent tool within the security arsenal, particularly when integrated with Privileged Access Management (PAM). This presentation explores the importance of MFA in PAM and how it enhances overall security posture. Bert Blevins https://bertblevins.com/ 27-06-2024
  • 2. Understanding Privileged Access Management 1 Definition Privileged access management encompasses methods, protocols, and tools to regulate and monitor access to privileged accounts within an organization. 2 Elevated Privileges These accounts enable users to execute vital operations such as system configuration, access to sensitive data, and management of network infrastructure. 3 Security Risk If these privileges fall into the wrong hands, they pose a significant security risk to the organization.
  • 3. The Significance of Multi-Factor Authentication Additional Protection MFA adds an extra layer of security by requiring users to provide multiple forms of verification before gaining access to a system or application. Multiple Factors MFA incorporates factors such as something the user knows (like a password), something they possess (such as a security token or smartphone), and something inherent to their identity (like biometric information). Enhanced Security MFA diminishes the likelihood of unauthorized access to privileged accounts, even if a hacker obtains a user's password through phishing or other means. Bert Blevins https://bertblevins.com/
  • 4. Biometric Verification in MFA Unique Physical Characteristics Biometric authentication utilizes unique physical characteristics like fingerprints or facial recognition for verification. Added Security Layer Biometrics provide an additional layer of security in privileged access authentication. Difficult to Replicate The difficulty in replicating biometric data makes it an effective form of authentication.
  • 5. Passwords in Multi-Factor Authentication 1 One Factor Passwords constitute one factor in MFA but are insufficient alone for robust security. 2 Stringent Policies Enforcing stringent password policies, such as using complex, unique passwords for each account, is imperative. 3 Regular Changes Regularly changing passwords is an important part of maintaining security in MFA systems. Bert Blevins https://bertblevins.com/
  • 6. Security Tokens in MFA Physical Objects Security tokens, also known as smart cards, are physical objects integral to the login process. Authentication Credentials These tokens generate or store authentication credentials for secure access. Enhanced Security Security tokens enhance security by requiring users to possess both the physical device and their password. Bert Blevins https://bertblevins.com/
  • 7. One-Time Passcodes (OTP) in MFA 1 Generation OTPs are temporary codes generated by a token or authentication app. 2 Usage These codes must be entered along with the password to complete the authentication process. 3 Delivery OTPs are especially effective when delivered via out-of-band methods like SMS or mobile apps. 4 Expiration OTPs are typically valid for a short period, enhancing security. Bert Blevins https://bertblevins.com/
  • 8. Implementing MFA in PAM: Integration Seamless Integration MFA systems should seamlessly integrate with existing PAM platforms for centralized control. Uniform Enforcement Integration enables administrators to uniformly enforce MFA policies across all privileged accounts. Centralized Oversight Integrated systems provide comprehensive oversight of privileged access within the organization. Bert Blevins https://bertblevins.com/
  • 9. Implementing MFA in PAM: Scalability and Flexibility 1 Adaptability MFA systems must be adaptable to accommodate evolving security requirements as organizations expand. 2 New Technologies Systems should support new authentication technologies to stay current with security trends. 3 User Base Growth MFA solutions must scale to meet the needs of growing user bases within the organization. Bert Blevins https://bertblevins.com/
  • 10. Implementing MFA in PAM: Continuous Monitoring 1 Vigilant Monitoring Continuous monitoring of user behavior and authentication logs is essential. 2 Suspicious Activity Detection Monitoring enables the detection of suspicious activity and potential security breaches. 3 Data Analysis Analyzing authentication data helps organizations enhance their MFA policies. 4 Security Posture Improvement Insights from monitoring contribute to improving overall security posture. Bert Blevins https://bertblevins.com/
  • 11. User Experience in MFA Implementation Balance Balancing security and usability is essential to ensure that MFA does not hinder productivity. User-Friendly Methods Organizations should opt for user-friendly authentication methods that offer robust security. Productivity A well-implemented MFA system enhances security without significantly impacting user workflow. Bert Blevins https://bertblevins.com/
  • 12. Regulatory Compliance in MFA Selection 1 Sector-Specific Regulations Various sectors, such as government, healthcare, and finance, are subject to stringent data security regulations. 2 Alignment with Laws Ensure that your chosen MFA solution aligns with all relevant laws and regulations, including GDPR, HIPAA, and PCI DSS. 3 Compliance Verification Regularly verify that your MFA implementation meets current compliance standards. Bert Blevins https://bertblevins.com/
  • 13. Integration Capabilities of MFA Solutions Existing Infrastructure Assess how effectively MFA solutions integrate with your existing PAM infrastructure. Other Authentication Systems Consider integration with other authentication systems used in your organization. Seamless Integration Benefits Seamless integration enhances overall security posture and simplifies centralized management.
  • 14. Policy Configuration in MFA Implementation 1 Establish MFA Policies Create MFA policies aligned with your company's security guidelines and risk assessment. 2 Define Authentication Frequency Determine how often users need to authenticate using multiple factors. 3 Set Fallback Options Establish fallback options for users without MFA devices. 4 Role-Based Enforcement Define MFA enforcement for specific user roles within the organization. Bert Blevins https://bertblevins.com/
  • 15. User Awareness and Training for MFA 1 Education on Best Practices Thoroughly educate users on MFA best practices and the importance of safeguarding login credentials. 2 Phishing Awareness Train users to identify phishing scams that may attempt to compromise MFA security. 3 Security Culture Cultivate a culture of security awareness to mitigate the risk of human error in MFA usage. Bert Blevins https://bertblevins.com/
  • 16. Continuous Monitoring and Optimization of MFA Regular Monitoring Continuously monitor user behavior and authentication records to detect anomalies or suspicious activity. Data Analysis Analyze collected data to gain insights into MFA effectiveness and user patterns. Policy Refinement Use data insights to refine MFA policies and bolster overall security posture. Threat Response Adapt MFA strategies to respond to emerging threats identified through monitoring. Bert Blevins https://bertblevins.com/
  • 17. The Future of MFA in Privileged Access Management AI Integration Artificial intelligence will play a larger role in MFA, enhancing threat detection and adaptive authentication. Advanced Biometrics More sophisticated biometric methods will be incorporated into MFA systems for increased security. Blockchain Security Blockchain technology may be leveraged to create more secure and decentralized authentication systems. Cloud-Based Solutions Cloud-native MFA solutions will become more prevalent, offering greater scalability and flexibility. Bert Blevins https://bertblevins.com/
  • 18. The Future of MFA in Privileged Access Management AI Integration Artificial intelligence will play a larger role in MFA, enhancing threat detection and adaptive authentication. Advanced Biometrics More sophisticated biometric methods will be incorporated into MFA systems for increased security. Blockchain Security Blockchain technology may be leveraged to create more secure and decentralized authentication systems. Cloud-Based Solutions Cloud-native MFA solutions will become more prevalent, offering greater scalability and flexibility. Bert Blevins https://bertblevins.com/
  • 19. About Bert Blevins Bert Blevins is a dedicated professional with numerous certifications and degrees. He holds a Bachelor's in Advertising and an MBA. Phone 832-281-0330 Email info@incgpt.com LinkedIn Profile Bert Blevins https://bertblevins.com/