BeyondTrust's premier customer and partner conference will bring together regional audiences like never before. This April, catch us at The JW Marriott Marquis Miami, joining other BeyondTrust customers and partners in your region. By attending you'll be able to:

  • Stay ahead of the evolving cybersecurity landscape: With new threats and vulnerabilities emerging every day, you'll come away equipped with the latest knowledge and insights to proactively defend against emerging threats.
  • Enhance the value of your BeyondTrust portfolio: Talk shop with BeyondTrust experts and our technology alliance partners to hear about the latest innovations in our products to better utilise your BeyondTrust investments.
  • Network with Industry Peers and Experts: Hear from fellow customers and strategic partners, exchange ideas and best practices and build your network.

'I've been in the tech industry for 20+ years and I've been to many other conferences, but Go Beyond has been my favorite. Attending Go Beyond has helped to sharpen my product knowledge, provided valuable face-time with the BeyondTrust team, and ultimately I was able to leave with the the tools I needed to elevate our BeyondTrust implementation."

—David Lokke, Senior Systems Administrator, Premier Bankcard

Rachel Wilson
Rachel Wilson
Head of Data Security and Infrastructure RIsk, Morgan Stanley Wealth Management
She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose t ... read more

She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose to run NSA's counter-terrorism operations mission. She also spent a few years at the American Embassy, helping the British get ready for the 2012 Summer Olympics. She returned to NSA headquarters in Maryland and for five years she ran cyber-exploitation missions against "our adversaries to keep the U.S. and her allies safe." Today, she leverages that experience to look at Morgan Stanley's networks, systems and applications "through the lens of an adversary."

She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose t ... read more
Rachel Wilson
Head of Data Security and Infrastructure RIsk, Morgan Stanley Wealth Management

She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose to run NSA's counter-terrorism operations mission. She also spent a few years at the American Embassy, helping the British get ready for the 2012 Summer Olympics. She returned to NSA headquarters in Maryland and for five years she ran cyber-exploitation missions against "our adversaries to keep the U.S. and her allies safe." Today, she leverages that experience to look at Morgan Stanley's networks, systems and applications "through the lens of an adversary."

×
Anna Essex
Anna Essex
Senior Compliance & Security Analyst, Polsinelli
David Lokke
David Lokke
System Administrator, Premier Bankcard
Jonathan Wyatte
Jonathan Wyatte
Information Security Analyst, Hallmark Cards
Sam Elliott
Sam Elliott
SVP, Products
Sam Elliott
SVP, Products

Sam Elliott is the Senior Vice President of Products at BeyondTrust, where he oversees the company’s solution portfolio. Leading with an identity security first approach, he drives product innovation and integration strategies across the broader security ecosystem. A technology veteran of over 18 years, Elliott’s focus is in privileged access management, remote access security, and SaaS strategies. He has helped build successful, cloud-first, startups and held product leadership roles across core technology industries, including Cyber Security, IT Asset Management, and IT Service Management. Elliott earned his Bachelor of Science from Florida State University.

×
Janine Seebeck
Janine Seebeck
Chief Executive Officer & Board Member
  • X
  • LinkedIn profile link
Janine Seebeck
Chief Executive Officer & Board Member

As Chief Executive Officer of BeyondTrust, Janine is responsible for BeyondTrust’s long-term market and product strategy and leads the company’s day-to-day operations. She also guides BeyondTrust’s unique culture that is centered on integrity, transparency, respect, and innovation. Seebeck joined the company in 2016 as Chief Financial Officer and expanded her role in 2020 to Chief Operating Officer as well. Prior to becoming CEO, Seebeck was responsible for the company’s financial, operational, accounting, IT, and strategic planning functions. Seebeck has more than 25 years of senior finance and operations experience, most recently serving as Chief Financial Officer, Senior Vice President and Treasurer of Agilysys Inc., a hospitality software leader. She previously held the positions of Vice President and Controller and Principal Accounting Officer at Agilysys. Prior to Agilysys, Seebeck served as Vice President of Finance, Asia Pacific, and Vice President, Corporate Controller for PGi, a global leader in virtual meetings. Seebeck also served as a Senior Associate for PricewaterhouseCoopers. She is a Certified Public Accountant and holds a Bachelor of Science in Business Administration (BSBA) degree in Accounting from John Carroll University.

×
Morey J. Haber
Morey J. Haber
Chief Security Advisor
  • X
  • LinkedIn profile link
Morey J. Haber
Chief Security Advisor

Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

×
Jason Jones
Jason Jones
Director, Product Management
Jason Jones
Director, Product Management

Jason has been building business applications and software products going on 15 years. With a background in Development, QA, Product Management, and wearing as many hats as possible at a medical startup, he has extensive experience with the entire product lifecycle. Jason has been working on BeyondTrust products for the past 10 years and has a primary focus on our Privileged Password and Session Management solutions.

×
Brian Hanrahan
Brian Hanrahan
VP Product Management, Identity Security
Ron Nissim
Ron Nissim
VP, Product Management
Brian Botich
Brian Botich
Director of Channel and Aliances, XMS
Matt Bates
Matt Bates
Director of Technology Alliances at Ping Identity
Trevor Combs
Trevor Combs
Senior Solutions Engineer
Trevor Combs
Senior Solutions Engineer

Trevor A. Combs is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. Prior to that he spent most of his career in IT Process and Program Management for various global companies in the IT Support, Finance, Construction and Vendor Outsourcing industries with over 20 years in the Support and Security space. In his free time he enjoys teaching seminars and classes to seniors on how to enrich their lives with technology and keep their data and personal information safe.

×
Paul Da Silva
Paul Da Silva
Sr Solutions Architect
Josh Brodbent
Josh Brodbent
RVP, Public Sector Solutions Engineering
Josh Brodbent
RVP, Public Sector Solutions Engineering

Josh has more than 20 years in IT experience and has architected identity and privilege access management solutions for over 3 million user accounts. He joined BeyondTrust in 2018 as a Senior Solutions Engineer and was quickly selected to lead the team. Prior to BeyondTrust, he was a senior Solutions architect for Quest Software. He began his career by founding a managed service provider (MSP) at 12. He held multiple industry certifications by 14, making him the youngest in the nation to do so. That MSP went on to become successful, and ultimately his launching point into Public Sector architecture and support.

×
Jeff Parker
Jeff Parker
Senior Solutions Engineer
Jeff Parker
Senior Solutions Engineer

Jeff Parker earned his bachelor's degree in Management Information Systems from FSU’s Rovetta College of Business in 2000 and became an ISC2 Certified Information Systems Security Professional in 2003.

Jeff’s career prior to moving into the software industry included two higher education institutions and an engineering firm.

Jeff has almost 20 years of experience in information security, including all facets of securing privileges, identities, and security information.

×
Jessica DuBois
Jessica DuBois
Senior ISV Sales Leader, Amazon Web Services
Alex Piszczek
Alex Piszczek
Senior Staff Security Researcher
Chiradeep Basu
Chiradeep Basu
Managing Director, Deloitte
Sanjay Saikia
Sanjay Saikia
Global Business Head, Digital Identity- HCLTech
April 29 April 30 May 1
4 p.m. - 6 p.m. - Registration Open 8 a.m. - 12 p.m. - Morning Keynote Sessions 8 a.m. - 12 p.m. - BeyondTrust University Workshops (Complimentary)
Dinner on your own 12 p.m. - 1 p.m. Lunch
1 p.m. - 5 p.m. - Master Class Breakouts, Afternoon Keynotes
6 p.m. - 9 p.m. - Go Beyond Party (On-Property)
1280px Deloitte svg
Ping Identity Logo New
XMS Solutions Black Background 002
Integral Partners
Tenable
Servicenow
Amazon Web Services Logo
Optiv logo trans
Guidepoint

There is no cost to attend Go Beyond Miami, but attendees will be responsible for their travel and accommodation.


A limited virtual option will be offered. Sessions hosted on the main-stage at Miami will be available to view on-demand post-event. Please visit the virtual page to register for the virtual component.

BeyondTrust University instructors will be on-site to offer a variety of technical workshops on the morning of May 1. No certification testing will be offered, but it will provide a mix of technical content available through BeyondTrust University. All registrants are welcome to attend.

Please email the Go Beyond events team at gobeyond@beyontrust.com if you need to change or cancel your registration.


Prefers reduced motion setting detected. Animations will now be reduced as a result.