In light of the recent high-profile social media account breaches, organizations are strategizing how to better protect their own social media accounts (Twitter, LinkedIn, Facebook, Instagram, Tik Tok, etc.). Threat actors have long been using ransomware and phishing attacks to gain access and compromise enterprise accounts. In almost every instance, this involves the exploitation of privileges/privileged access. This is no difference when it comes to threats against social media accounts. Locking down privileges across the entire organization -- including social media accounts -- has never been more critical from protecting against both external and internal threats.

Join Sami Laiho, one of the world's leading professionals in the Windows OS and Security, and learn how to protect your company's social accounts (and reputation!) in the constantly evolving digital world. Sami will also discuss:

  1. The evolution of cybercrime
  2. Real-life examples of internal threats
  3. Best practices in protecting online social accounts

While it is a hard truth that little can be done to protect an organization when the SaaS vendor and its employees are breached, there are myriad security best practices that can be enacted to mitigate the risks of a privileged attack vector and inappropriate account access. BeyondTrust CTO and CISO, Morey Haber, shares his security best practices around privileged access management.

Morey J. Haber

Chief Technology Officer and Chief Information Security Officer at BeyondTrust

Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Sami Laiho

Windows OS & Security Expert, Senior Technical Fellow

Sami Laiho is one of the world’s leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security since 1996.

In 2019 Sami was chosen by TiVi-magazine as one of the top 100 influencers in IT in Finland. He is the 11th most followed person in his field in Finland.

At Ignite 2018, Sami’s “Behind the Scenes: How to build a conference winning session” and “Sami Laiho: 45 Life Hacks of Windows OS in 45 minutes” sessions were ranked as #1 and #2 out of 1708 sessions!! This was the first time in the history of the conference that anyone has been able to do this.

Before that, at Ignite 2017, the world’s biggest Microsoft event, Sami was evaluated as the Best External Speaker! Also, Sami’s sessions were evaluated as the Best session in TechEd North America, Europe and Australia in 2014, and Nordic Infrastructure Conference in 2016, 2017 and 2019.