Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreUnlock exclusive on-demand content from our latest world tour
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
with Christopher Hills, Chief Security Strategist, BeyondTrust; John Singleton, Senior Solutions Engineer, BeyondTrust
Following our 10th anniversary edition, this year we are turning things up to 11 by asking one key question as we look across the Microsoft vulnerability landscape:
“Are organizations having an identity crisis?”
Watch Chris Hills, Chief Security Strategist and John Singleton, Sr Solutions Engineer in this upcoming webinar as they dissect the 2023 Microsoft vulnerabilities data and assesses how these vulnerabilities are being leveraged in identity-based attacks. They will also spotlight some of the most significant CVEs of 2023 (9.0+ CVSS severity scores), breaks down how they are leveraged by attackers, and explains how they can be mitigated.
Chris and John cover:
Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy. Chris has held the Sr Solution’s Architect, Deputy CTO, and Deputy CISO roles since starting with BeyondTrust. Chris is also co-author in the Cloud Attack Vectors book, a contributor in the New Privileged Attack Vectors book, and editor in previous books. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s college football career, going to the sand dunes off-roading.
John has worked in the cybersecurity sector for over 10 years and has extensive experience in a number of identity security related disciplines.
John has worked with a wide variety of customer organisations including Financial Services, Government, Retail, Resources, Utilities, Healthcare and Education helping them to define and articulate their identity security requirements and working to identify and implement solutions to meet those requirements and adapt them over time.