BeyondTrust's premier customer and partner conference will bring together regional audiences like never before. This April, catch us at The Meritage Spa and Resort, Napa, joining other BeyondTrust customers and partners in your region. By attending you'll be able to:

  • Stay ahead of the evolving cybersecurity landscape: With new threats and vulnerabilities emerging every day, you'll come away equipped with the latest knowledge and insights to proactively defend against emerging threats.
  • Enhance the value of your BeyondTrust portfolio: Talk shop with BeyondTrust experts and our technology alliance partners to hear about the latest innovations in our products to better utilise your BeyondTrust investments.
  • Network with Industry Peers and Experts: Hear from fellow customers and strategic partners, exchange ideas and best practices and build your network.

'I've been in the tech industry for 20+ years and I've been to many other conferences, but Go Beyond has been my favorite. Attending Go Beyond has helped to sharpen my product knowledge, provided valuable face-time with the BeyondTrust team, and ultimately I was able to leave with the the tools I needed to elevate our BeyondTrust implementation."

—David Lokke, Senior Systems Administrator, Premier Bankcard

Full Agenda Here

Morning (7 a.m. - 12 p.m.) Afternoon ( 12p.m. - 5 p.m.) Evening (6 p.m. - 9 p.m. )
Registration + Networking Breakfast Lunch Dinner Reception in the Wine Cave (On-Site)
Keynote Sessions Breakout Sessions
Product Innovation Updates Customer Spotlight Sessions
Rachel Wilson
Rachel Wilson
Head of Data Security and Infrastructure RIsk, Morgan Stanley Wealth Management
She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose t ... read more

She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose to run NSA's counter-terrorism operations mission. She also spent a few years at the American Embassy, helping the British get ready for the 2012 Summer Olympics. She returned to NSA headquarters in Maryland and for five years she ran cyber-exploitation missions against "our adversaries to keep the U.S. and her allies safe." Today, she leverages that experience to look at Morgan Stanley's networks, systems and applications "through the lens of an adversary."

She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose t ... read more
Rachel Wilson
Head of Data Security and Infrastructure RIsk, Morgan Stanley Wealth Management

She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose to run NSA's counter-terrorism operations mission. She also spent a few years at the American Embassy, helping the British get ready for the 2012 Summer Olympics. She returned to NSA headquarters in Maryland and for five years she ran cyber-exploitation missions against "our adversaries to keep the U.S. and her allies safe." Today, she leverages that experience to look at Morgan Stanley's networks, systems and applications "through the lens of an adversary."

×
Chris Dailey
Chris Dailey
Manager, Information Security, Benjamin Moore
Michiel Stoop
Michiel Stoop
Head of Identity & Access Management, Philips
Michiel Stoop has more than 15 years' experience in the information and security domain with a focus on Identity and Access management. Within Group Security Information Security at Philips, Michiel is responsible for the IAM Vision and Strategy for ... read more

Michiel Stoop has more than 15 years' experience in the information and security domain with a focus on Identity and Access management. Within Group Security Information Security at Philips, Michiel is responsible for the IAM Vision and Strategy for B2E/B2B and B2C.

Michiel Stoop has more than 15 years' experience in the information and security domain with a focus on Identity and Access management. Within Group Security Information Security at Philips, Michiel is responsible for the IAM Vision and Strategy for ... read more
Michiel Stoop
Head of Identity & Access Management, Philips

Michiel Stoop has more than 15 years' experience in the information and security domain with a focus on Identity and Access management. Within Group Security Information Security at Philips, Michiel is responsible for the IAM Vision and Strategy for B2E/B2B and B2C.

×
Logan McDonald
Logan McDonald
IT Systems Analyst, Town of Truckee
Logan McDonald, an Information Security and Technology Analyst from Truckee, California, possesses a distinguished track record, highlighted by his pivotal role in navigating and resolving a significant ransomware crisis. With certifications as a GIA ... read more

Logan McDonald, an Information Security and Technology Analyst from Truckee, California, possesses a distinguished track record, highlighted by his pivotal role in navigating and resolving a significant ransomware crisis. With certifications as a GIAC Penetration Tester and Network Security Administrator, Logan combines deep technical expertise with practical experience. His proactive approach to cyber recovery and security implementation has not only restored but also fortified the digital infrastructure of Truckee. Logan is dedicated to leveraging his insights and skills to empower organizations against the evolving landscape of cyber threats, ensuring they remain resilient and secure.

Logan McDonald, an Information Security and Technology Analyst from Truckee, California, possesses a distinguished track record, highlighted by his pivotal role in navigating and resolving a significant ransomware crisis. With certifications as a GIA ... read more
Logan McDonald
IT Systems Analyst, Town of Truckee

Logan McDonald, an Information Security and Technology Analyst from Truckee, California, possesses a distinguished track record, highlighted by his pivotal role in navigating and resolving a significant ransomware crisis. With certifications as a GIAC Penetration Tester and Network Security Administrator, Logan combines deep technical expertise with practical experience. His proactive approach to cyber recovery and security implementation has not only restored but also fortified the digital infrastructure of Truckee. Logan is dedicated to leveraging his insights and skills to empower organizations against the evolving landscape of cyber threats, ensuring they remain resilient and secure.

×
Chris Hardy
Chris Hardy
Chief Information Technology & Security Officer, Town of Truckee
Chris Hardy, from Sacramento, California, has pursued his interest in technology and security throughout his career, enriched by a Master's in Cybersecurity and Operations Leadership and the completion of the FBI Sacramento Cyber Academy program. Ini ... read more

Chris Hardy, from Sacramento, California, has pursued his interest in technology and security throughout his career, enriched by a Master's in Cybersecurity and Operations Leadership and the completion of the FBI Sacramento Cyber Academy program. Initially, Chris worked in technical roles for police, fire, and emergency dispatch services, where he honed his skills in technical compliance, public safety technologies, and system hardening. His experience in these areas laid the groundwork for managing a utility technology team focused on enhancing billing and metering systems, which generate over $300 million in annual revenue. Following a devastating cyberattack on the Town of Truckee, Chris was appointed as the Chief Information Security and Technology Officer, a role in which he was tasked with overseeing the recovery and strategizing for the Town's long-term success. Chris is deeply passionate about advocating for cyber resilience and risk prevention, sharing his insights and expertise with government agencies, private enterprises, and aspiring tech professionals.

Chris Hardy, from Sacramento, California, has pursued his interest in technology and security throughout his career, enriched by a Master's in Cybersecurity and Operations Leadership and the completion of the FBI Sacramento Cyber Academy program. Ini ... read more
Chris Hardy
Chief Information Technology & Security Officer, Town of Truckee

Chris Hardy, from Sacramento, California, has pursued his interest in technology and security throughout his career, enriched by a Master's in Cybersecurity and Operations Leadership and the completion of the FBI Sacramento Cyber Academy program. Initially, Chris worked in technical roles for police, fire, and emergency dispatch services, where he honed his skills in technical compliance, public safety technologies, and system hardening. His experience in these areas laid the groundwork for managing a utility technology team focused on enhancing billing and metering systems, which generate over $300 million in annual revenue. Following a devastating cyberattack on the Town of Truckee, Chris was appointed as the Chief Information Security and Technology Officer, a role in which he was tasked with overseeing the recovery and strategizing for the Town's long-term success. Chris is deeply passionate about advocating for cyber resilience and risk prevention, sharing his insights and expertise with government agencies, private enterprises, and aspiring tech professionals.

×
Marc Maiffret
Marc Maiffret
Chief Technology Officer
  • X
  • LinkedIn profile link
Marc Maiffret
Chief Technology Officer

As Chief Technology Officer, Marc Maiffret is responsible for leading BeyondTrust’s product strategy and leading the global engineering organizations to address market needs in intelligent identity and access security. Maiffret is a well-known entrepreneur and executive with over 20 years of experience in security leadership at organizations such as eEye Digital Security, FireEye, SpaceX, and BeyondTrust. Maiffret founded his first company shortly after being raided by the FBI at the age of 17. As a security researcher, Marc was an early pioneer in Microsoft vulnerability research, including co-discovering and naming Code Red, the first Microsoft computer worm. Marc has presented at numerous security conferences and has testified before Congress on matters of national security. As an entrepreneur, Marc helped design and build some of the first products for Vulnerability Management, Web Application Firewalling, Endpoint Security, and Malware Detonation. Marc has written for numerous publications and is regularly sought after by media organizations to break down complex security topics.

×
Sam Elliott
Sam Elliott
SVP, Products
Sam Elliott
SVP, Products

Sam Elliott is the Senior Vice President of Products at BeyondTrust, where he oversees the company’s solution portfolio. Leading with an identity security first approach, he drives product innovation and integration strategies across the broader security ecosystem. A technology veteran of over 18 years, Elliott’s focus is in privileged access management, remote access security, and SaaS strategies. He has helped build successful, cloud-first, startups and held product leadership roles across core technology industries, including Cyber Security, IT Asset Management, and IT Service Management. Elliott earned his Bachelor of Science from Florida State University.

×
Morey J. Haber
Morey J. Haber
Chief Security Advisor
  • X
  • LinkedIn profile link
Morey J. Haber
Chief Security Advisor

Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

×
Todd Mera
Todd Mera
Sr Solutions Engineer
Jason Silva
Jason Silva
Sr. Solutions Architect
Jason Silva
Sr. Solutions Architect

Jason Silva is a Senior Solutions Architect focused in Privilege Access Management (PAM), Identity and Access Management (IAM), and Least Privilege. Jason brings over 25 years of experience in solutions management to BeyondTrust's Privileged Access Management Solutions enforcing Privileged Password Management and Privileged Session Management, Privileged Endpoint Management, and Secure Remote Access which utilizes a single pane of glass for all management aspects including Automated Account Discovery, Privileged Management and Elevation, Audit and Compliance, and Reporting.

×
Trevor Combs
Trevor Combs
Senior Solutions Engineer
Trevor Combs
Senior Solutions Engineer

Trevor A. Combs is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. Prior to that he spent most of his career in IT Process and Program Management for various global companies in the IT Support, Finance, Construction and Vendor Outsourcing industries with over 20 years in the Support and Security space. In his free time he enjoys teaching seminars and classes to seniors on how to enrich their lives with technology and keep their data and personal information safe.

×
Prashant Mascarenhas
Prashant Mascarenhas
VP and Global Head of Solutions, Cybersecurity, HCLTech
Prashant Mascarenhas
VP and Global Head of Solutions, Cybersecurity, HCLTech

Prashant is an experienced leader, with over 25 years of working with HCLTech customers across the US, UK, Europe and the emerging markets of APAC, ANZ, India, & MEA. Prashant has invaluable experience in designing and deploying IT solutions, particularly in the fields of cybersecurity, enterprise networks, cloud, and datacenter transformation across all major industry verticals. Prashant has held different technical & business leadership roles in his tenure with HCLTech, helping successfully build and scale, various Service offerings & customer engagements.

×
Kory Wilson
Kory Wilson
VP, Client Services, Integral Partners
Kory Wilson
VP, Client Services, Integral Partners

Kory is a co-founder of Integral Partners and has over 24 years of direct sales, management and marketing experience. Kory is VP of Client Services and responsible for worldwide sales, business development, and marketing. Kory is driven to understand, tailor, and identify solutions that address business stakeholder value, IT resource capability, technology alignment, budget realities and investment timing.

Before joining Integral Partners, Kory was the director of client services with the security company iRise and has held sales leadership positions in telecommunications, brand protection security, and software professional services.

×
David Morimanno
David Morimanno
Director of IAM Technologies, Integral Partners
David Morimanno
Director of IAM Technologies, Integral Partners

As a Director of Identity & Access Management Technologies, David helps clients develop IAM and Zero Trust strategies that work in complex organizations. He's an active practitioner and strategist, with nearly 20 years of hands-on experience in implementing market-leading IAM technologies across IGA, PAM, and Access Management. He specializes in building IAM Programs, administering IAM tools, and developing long-term strategies to support organizational objectives and business enablement.

David has a passion for cybersecurity. He is a trusted advisor for Fortune 500 clients and has helped industry executives successfully execute large-scale IAM programs through deployment. He has extensive experience in financial services, energy, education, manufacturing, and healthcare industries.

×
Matt Bates
Matt Bates
Director of Technology Alliances at Ping Identity
Serge Nadon
Serge Nadon
Cyber Security Specialist OT, Tenable
Sunil Yerkola
Sunil Yerkola
Sr. Solutions Architect, AWS
Sunil Yerkola
Sr. Solutions Architect, AWS

Sunil Yerkola is a seasoned technology professional with over 20 years of experience in leading engineering organizations across various business domains. Currently, he works for AWS as a Sr Solution Architect, where he partners with ISV customers as a technical advisor to help them achieve their business and technical goals. In this role, Sunil leverages his extensive knowledge of the technology domain to design and implement solutions that drive business success. He holds a Master's degree in Information Technology from Harvard Extension School and an MBA from Dudley College.

×
Guidepoint
Integral Partners
Ping Identity Logo New
Servicenow
Optiv logo trans
HCL NEW Logo No Backgrd
Amazon Web Services Logo
Tenable

There is no cost to attend Go Beyond Napa, but attendees will be responsible for their travel and accommodation.


Go Beyond Napa will be in-person only.


Please email the Go Beyond events team at gobeyond@beyondtrust.com if you need to change or cancel your registration.


Want to learn why over 20,000 customers chose BeyondTrust?
Prefers reduced motion setting detected. Animations will now be reduced as a result.