Following our 10th anniversary edition, this year we are turning things up to 11 by asking one key question as we look across the Microsoft vulnerability landscape:

“Are organizations having an identity crisis?”

Join Chris Hills, Chief Security Strategist and John Singleton, Sr Solutions Engineer in this upcoming webinar as they dissect the 2023 Microsoft vulnerabilities data and assesses how these vulnerabilities are being leveraged in identity-based attacks. They will also spotlight some of the most significant CVEs of 2023 (9.0+ CVSS severity scores), breaks down how they are leveraged by attackers, and explains how they can be mitigated.

Chris and John will also cover:

  • 11 years of Microsoft vulnerability trends and key data highlights from the 2024 report
  • What is an “Identity Crisis” and why organizations are experiencing this now
  • Ways to identify an identity crisis in your Microsoft ecosystem
  • Key insights from some of the world’s leading cybersecurity and Microsoft experts

All attendees will receive a complimentary copy of the 2024 Microsoft Vulnerabilities Report!

Christopher Hills
Christopher Hills
Chief Security Strategist, BeyondTrust
Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with Beyo ... read more

Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy. Chris has held the Sr Solution’s Architect, Deputy CTO, and Deputy CISO roles since starting with BeyondTrust. Chris is also co-author in the Cloud Attack Vectors book, a contributor in the New Privileged Attack Vectors book, and editor in previous books. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s college football career, going to the sand dunes off-roading.

Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with Beyo ... read more
  • X
  • LinkedIn profile link
Christopher Hills
Chief Security Strategist, BeyondTrust

Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy. Chris has held the Sr Solution’s Architect, Deputy CTO, and Deputy CISO roles since starting with BeyondTrust. Chris is also co-author in the Cloud Attack Vectors book, a contributor in the New Privileged Attack Vectors book, and editor in previous books. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s college football career, going to the sand dunes off-roading.

×
John Singleton
John Singleton
Senior Solutions Engineer, BeyondTrust
John has worked in the cybersecurity sector for over 10 years and has extensive experience in a number of identity security related disciplines. John has worked with a wide variety of customer organisations including Financial Services, Government, R ... read more

John has worked in the cybersecurity sector for over 10 years and has extensive experience in a number of identity security related disciplines.

John has worked with a wide variety of customer organisations including Financial Services, Government, Retail, Resources, Utilities, Healthcare and Education helping them to define and articulate their identity security requirements and working to identify and implement solutions to meet those requirements and adapt them over time.

John has worked in the cybersecurity sector for over 10 years and has extensive experience in a number of identity security related disciplines. John has worked with a wide variety of customer organisations including Financial Services, Government, R ... read more
John Singleton
Senior Solutions Engineer, BeyondTrust

John has worked in the cybersecurity sector for over 10 years and has extensive experience in a number of identity security related disciplines.

John has worked with a wide variety of customer organisations including Financial Services, Government, Retail, Resources, Utilities, Healthcare and Education helping them to define and articulate their identity security requirements and working to identify and implement solutions to meet those requirements and adapt them over time.

×
Prefers reduced motion setting detected. Animations will now be reduced as a result.