, – nachm. CET mit Martin Kuppinger, Principal Analyst KuppingerCole; Morey J. Haber, Chief Technology Officer, BeyondTrust
Join these Zero Trust experts as they discuss the most important issues surrounding the implementation of this model of security. Martin Kuppinger will lead the discussion around the key elements of Zero Trust, the business benefits – especially in the post-Covid era of increased working from home, and the most common barriers to implementation.
Morey Haber, who has more than 25 years of IT industry experience and oversees BeyondTrust’s strategy for Privileged Access Management (PAM) and remote access solutions, will bring a wealth of knowledge and experience to the discussion, especially around how PAM solutions can help organizations to implement Zero Trust successfully.
How to achieve Least Privilege and Secure Remote Access with a Zero Trust strategy
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.
A good understanding of the barriers to implementation and the tools that can help is essential to enabling organizations to discover their best route to securing their environments and minimizing risk, according to Martin Kuppinger, Principal Analyst at KuppingerCole and Morey Haber, CTO & CISO at BeyondTrust.
Join this webinar to:
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known as a widely-read columnist and author of technical articles and reviews in some of the most prestigious IT magazines in Germany, Austria and Switzerland. He is also a well-established speaker and moderator at seminars and congresses. His interest in Identity Management dates back to the 80ies, when he also gained considerable experience in software architecture development. Over the years, he added several other fields of research, including virtualization, cloud computing, overall IT security, and others. Having studied economies, he combines in-depth IT knowledge with a strong business perspective.
With more than 20 years of IT industry experience and author of Privileged Attack Vectors, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently oversees BeyondTrust technology for both vulnerability and privileged access management solutions. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.