BeyondTrust's premier customer and partner conference will bring together regional audiences like never before. This April, catch us at The Meritage Spa and Resort, Napa, joining other BeyondTrust customers and partners in your region. By attending you'll be able to:
'I've been in the tech industry for 20+ years and I've been to many other conferences, but Go Beyond has been my favorite. Attending Go Beyond has helped to sharpen my product knowledge, provided valuable face-time with the BeyondTrust team, and ultimately I was able to leave with the the tools I needed to elevate our BeyondTrust implementation."
—David Lokke, Senior Systems Administrator, Premier Bankcard
Morning (7 a.m. - 12 p.m.) | Afternoon ( 12p.m. - 5 p.m.) | Evening (6 p.m. - 9 p.m. ) |
---|---|---|
Registration + Networking Breakfast | Lunch | Dinner Reception in the Wine Cave (On-Site) |
Keynote Sessions | Breakout Sessions | |
Product Innovation Updates | Customer Spotlight Sessions |
She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose to run NSA's counter-terrorism operations mission. She also spent a few years at the American Embassy, helping the British get ready for the 2012 Summer Olympics. She returned to NSA headquarters in Maryland and for five years she ran cyber-exploitation missions against "our adversaries to keep the U.S. and her allies safe." Today, she leverages that experience to look at Morgan Stanley's networks, systems and applications "through the lens of an adversary."
She grew up listening to purple code and the Battle of Midway. These bedtime stories influenced her thinking and prepared her for her future roles. At the age of five she knew that she would work at the National Security Agency. She eventually rose to run NSA's counter-terrorism operations mission. She also spent a few years at the American Embassy, helping the British get ready for the 2012 Summer Olympics. She returned to NSA headquarters in Maryland and for five years she ran cyber-exploitation missions against "our adversaries to keep the U.S. and her allies safe." Today, she leverages that experience to look at Morgan Stanley's networks, systems and applications "through the lens of an adversary."
Michiel Stoop has more than 15 years' experience in the information and security domain with a focus on Identity and Access management. Within Group Security Information Security at Philips, Michiel is responsible for the IAM Vision and Strategy for B2E/B2B and B2C.
Michiel Stoop has more than 15 years' experience in the information and security domain with a focus on Identity and Access management. Within Group Security Information Security at Philips, Michiel is responsible for the IAM Vision and Strategy for B2E/B2B and B2C.
Logan McDonald, an Information Security and Technology Analyst from Truckee, California, possesses a distinguished track record, highlighted by his pivotal role in navigating and resolving a significant ransomware crisis. With certifications as a GIAC Penetration Tester and Network Security Administrator, Logan combines deep technical expertise with practical experience. His proactive approach to cyber recovery and security implementation has not only restored but also fortified the digital infrastructure of Truckee. Logan is dedicated to leveraging his insights and skills to empower organizations against the evolving landscape of cyber threats, ensuring they remain resilient and secure.
Logan McDonald, an Information Security and Technology Analyst from Truckee, California, possesses a distinguished track record, highlighted by his pivotal role in navigating and resolving a significant ransomware crisis. With certifications as a GIAC Penetration Tester and Network Security Administrator, Logan combines deep technical expertise with practical experience. His proactive approach to cyber recovery and security implementation has not only restored but also fortified the digital infrastructure of Truckee. Logan is dedicated to leveraging his insights and skills to empower organizations against the evolving landscape of cyber threats, ensuring they remain resilient and secure.
Chris Hardy, from Sacramento, California, has pursued his interest in technology and security throughout his career, enriched by a Master's in Cybersecurity and Operations Leadership and the completion of the FBI Sacramento Cyber Academy program. Initially, Chris worked in technical roles for police, fire, and emergency dispatch services, where he honed his skills in technical compliance, public safety technologies, and system hardening. His experience in these areas laid the groundwork for managing a utility technology team focused on enhancing billing and metering systems, which generate over $300 million in annual revenue. Following a devastating cyberattack on the Town of Truckee, Chris was appointed as the Chief Information Security and Technology Officer, a role in which he was tasked with overseeing the recovery and strategizing for the Town's long-term success. Chris is deeply passionate about advocating for cyber resilience and risk prevention, sharing his insights and expertise with government agencies, private enterprises, and aspiring tech professionals.
Chris Hardy, from Sacramento, California, has pursued his interest in technology and security throughout his career, enriched by a Master's in Cybersecurity and Operations Leadership and the completion of the FBI Sacramento Cyber Academy program. Initially, Chris worked in technical roles for police, fire, and emergency dispatch services, where he honed his skills in technical compliance, public safety technologies, and system hardening. His experience in these areas laid the groundwork for managing a utility technology team focused on enhancing billing and metering systems, which generate over $300 million in annual revenue. Following a devastating cyberattack on the Town of Truckee, Chris was appointed as the Chief Information Security and Technology Officer, a role in which he was tasked with overseeing the recovery and strategizing for the Town's long-term success. Chris is deeply passionate about advocating for cyber resilience and risk prevention, sharing his insights and expertise with government agencies, private enterprises, and aspiring tech professionals.
As Chief Technology Officer, Marc Maiffret is responsible for leading BeyondTrust’s product strategy and leading the global engineering organizations to address market needs in intelligent identity and access security. Maiffret is a well-known entrepreneur and executive with over 20 years of experience in security leadership at organizations such as eEye Digital Security, FireEye, SpaceX, and BeyondTrust. Maiffret founded his first company shortly after being raided by the FBI at the age of 17. As a security researcher, Marc was an early pioneer in Microsoft vulnerability research, including co-discovering and naming Code Red, the first Microsoft computer worm. Marc has presented at numerous security conferences and has testified before Congress on matters of national security. As an entrepreneur, Marc helped design and build some of the first products for Vulnerability Management, Web Application Firewalling, Endpoint Security, and Malware Detonation. Marc has written for numerous publications and is regularly sought after by media organizations to break down complex security topics.
Sam Elliott is the Senior Vice President of Products at BeyondTrust, where he oversees the company’s solution portfolio. Leading with an identity security first approach, he drives product innovation and integration strategies across the broader security ecosystem. A technology veteran of over 18 years, Elliott’s focus is in privileged access management, remote access security, and SaaS strategies. He has helped build successful, cloud-first, startups and held product leadership roles across core technology industries, including Cyber Security, IT Asset Management, and IT Service Management. Elliott earned his Bachelor of Science from Florida State University.
Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.
Jason Silva is a Senior Solutions Architect focused in Privilege Access Management (PAM), Identity and Access Management (IAM), and Least Privilege. Jason brings over 25 years of experience in solutions management to BeyondTrust's Privileged Access Management Solutions enforcing Privileged Password Management and Privileged Session Management, Privileged Endpoint Management, and Secure Remote Access which utilizes a single pane of glass for all management aspects including Automated Account Discovery, Privileged Management and Elevation, Audit and Compliance, and Reporting.
Trevor A. Combs is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. Prior to that he spent most of his career in IT Process and Program Management for various global companies in the IT Support, Finance, Construction and Vendor Outsourcing industries with over 20 years in the Support and Security space. In his free time he enjoys teaching seminars and classes to seniors on how to enrich their lives with technology and keep their data and personal information safe.
Prashant is an experienced leader, with over 25 years of working with HCLTech customers across the US, UK, Europe and the emerging markets of APAC, ANZ, India, & MEA. Prashant has invaluable experience in designing and deploying IT solutions, particularly in the fields of cybersecurity, enterprise networks, cloud, and datacenter transformation across all major industry verticals. Prashant has held different technical & business leadership roles in his tenure with HCLTech, helping successfully build and scale, various Service offerings & customer engagements.
Kory is a co-founder of Integral Partners and has over 24 years of direct sales, management and marketing experience. Kory is VP of Client Services and responsible for worldwide sales, business development, and marketing. Kory is driven to understand, tailor, and identify solutions that address business stakeholder value, IT resource capability, technology alignment, budget realities and investment timing.
Before joining Integral Partners, Kory was the director of client services with the security company iRise and has held sales leadership positions in telecommunications, brand protection security, and software professional services.
As a Director of Identity & Access Management Technologies, David helps clients develop IAM and Zero Trust strategies that work in complex organizations. He's an active practitioner and strategist, with nearly 20 years of hands-on experience in implementing market-leading IAM technologies across IGA, PAM, and Access Management. He specializes in building IAM Programs, administering IAM tools, and developing long-term strategies to support organizational objectives and business enablement.
David has a passion for cybersecurity. He is a trusted advisor for Fortune 500 clients and has helped industry executives successfully execute large-scale IAM programs through deployment. He has extensive experience in financial services, energy, education, manufacturing, and healthcare industries.
Sunil Yerkola is a seasoned technology professional with over 20 years of experience in leading engineering organizations across various business domains. Currently, he works for AWS as a Sr Solution Architect, where he partners with ISV customers as a technical advisor to help them achieve their business and technical goals. In this role, Sunil leverages his extensive knowledge of the technology domain to design and implement solutions that drive business success. He holds a Master's degree in Information Technology from Harvard Extension School and an MBA from Dudley College.
There is no cost to attend Go Beyond Napa, but attendees will be responsible for their travel and accommodation.
Go Beyond Napa will be in-person only.
Please email the Go Beyond events team at gobeyond@beyondtrust.com if you need to change or cancel your registration.