BeyondTrust's premier customer and partner conference brought together regional audiences like never before. Tune in virtually to see some of the sessions you missed on our World Tour.

  • Stay ahead of the evolving cybersecurity landscape: With new threats and vulnerabilities emerging every day, you'll come away equipped with the latest knowledge and insights to proactively defend against emerging threats.
  • Enhance the value of your BeyondTrust portfolio: Talk shop with BeyondTrust experts and our technology alliance partners to hear about the latest innovations in our products to better utilize your BeyondTrust investments.

Don't miss out on this valuable opportunity to learn about the latest trends and developments.

Register your details below to unlock exclusive content from our latest global customer conference!

Rachel Wilson
Rachel Wilson
Head of Data Security and Infrastructure RIsk, Morgan Stanley Wealth Management
Rachel Wilson
Head of Data Security and Infrastructure RIsk, Morgan Stanley Wealth Management

She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose to run NSA's counter-terrorism operations mission. She also spent a few years at the American Embassy, helping the British get ready for the 2012 Summer Olympics. She returned to NSA headquarters in Maryland and for five years she ran cyber-exploitation missions against "our adversaries to keep the U.S. and her allies safe." Today, she leverages that experience to look at Morgan Stanley's networks, systems and applications "through the lens of an adversary."

×
Christopher Hills
Christopher Hills
Chief Security Strategist, BeyondTrust
  • X
  • LinkedIn profile link
Christopher Hills
Chief Security Strategist, BeyondTrust

Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy. Chris has held the Sr Solution’s Architect, Deputy CTO, and Deputy CISO roles since starting with BeyondTrust. Chris is also co-author in the Cloud Attack Vectors book, a contributor in the New Privileged Attack Vectors book, and editor in previous books. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s college football career, going to the sand dunes off-roading.

×
Brian Hanrahan
Brian Hanrahan
VP Product Management, Identity Security
Morey J. Haber
Morey J. Haber
Chief Security Advisor
Morey J. Haber
Chief Security Advisor

Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

×
Chris Hardy
Chris Hardy
Chief Information Technology & Security Officer, Town of Truckee
Chris Hardy
Chief Information Technology & Security Officer, Town of Truckee

Chris Hardy, from Sacramento, California, has pursued his interest in technology and security throughout his career, enriched by a Master's in Cybersecurity and Operations Leadership and the completion of the FBI Sacramento Cyber Academy program. Initially, Chris worked in technical roles for police, fire, and emergency dispatch services, where he honed his skills in technical compliance, public safety technologies, and system hardening. His experience in these areas laid the groundwork for managing a utility technology team focused on enhancing billing and metering systems, which generate over $300 million in annual revenue. Following a devastating cyberattack on the Town of Truckee, Chris was appointed as the Chief Information Security and Technology Officer, a role in which he was tasked with overseeing the recovery and strategizing for the Town's long-term success. Chris is deeply passionate about advocating for cyber resilience and risk prevention, sharing his insights and expertise with government agencies, private enterprises, and aspiring tech professionals.

×
Logan McDonald
Logan McDonald
IT Systems Analyst, Town of Truckee
Logan McDonald
IT Systems Analyst, Town of Truckee

Logan McDonald, an Information Security and Technology Analyst from Truckee, California, possesses a distinguished track record, highlighted by his pivotal role in navigating and resolving a significant ransomware crisis. With certifications as a GIAC Penetration Tester and Network Security Administrator, Logan combines deep technical expertise with practical experience. His proactive approach to cyber recovery and security implementation has not only restored but also fortified the digital infrastructure of Truckee. Logan is dedicated to leveraging his insights and skills to empower organizations against the evolving landscape of cyber threats, ensuring they remain resilient and secure.

×
Anna Essex
Anna Essex
Senior Compliance & Security Analyst, Polsinelli
Trevor Combs
Trevor Combs
Senior Solutions Engineer
Trevor Combs
Senior Solutions Engineer

Trevor A. Combs is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. Prior to that he spent most of his career in IT Process and Program Management for various global companies in the IT Support, Finance, Construction and Vendor Outsourcing industries with over 20 years in the Support and Security space. In his free time he enjoys teaching seminars and classes to seniors on how to enrich their lives with technology and keep their data and personal information safe.

×
Jeff Parker
Jeff Parker
Senior Solutions Engineer
Jeff Parker
Senior Solutions Engineer

Jeff Parker earned his bachelor's degree in Management Information Systems from FSU’s Rovetta College of Business in 2000 and became an ISC2 Certified Information Systems Security Professional in 2003.

Jeff’s career prior to moving into the software industry included two higher education institutions and an engineering firm.

Jeff has almost 20 years of experience in information security, including all facets of securing privileges, identities, and security information.

×
Alex Piszczek
Alex Piszczek
Senior Staff Security Researcher
Prefers reduced motion setting detected. Animations will now be reduced as a result.