Many Universities have diverse and robust user populations. Just think of all the attributes, roles and access needed for undergrad and graduate students, facility, teachers, university hospitals or healthcare systems, and more. This complex network of users, admins, and accounts requires a complete Privileged Access Management (PAM) solution that protects and manages the many different types of privileged accounts within the Higher Ed system.

That’s why one major University turned to BeyondTrust to implement a Just-in-Time Privileged Access Management (JIT PAM) model to enforce true “least privilege.” JIT PAM is a model that ensures users, processes, applications, systems, etc. have “just enough” privileged access when needed, and for the least amount of time necessary.

Join Chris Stucker, Associate Director for Identity and Access Management, University of Utah, as he shares his experience around a JIT PAM implementation and Universal Privilege Management (UPM) approach to security. Chris will discuss how JIT PAM:

BeyondTrust’s CTO and CISO Morey Haber will also cover how BeyondTrust’s Universal PAM approach aligns with NIST-CSF to help universities mitigate insider threats (NIST-CSF Protect), achieve compliance, and receive federal funding and competitive grants.

You won’t want to miss out on this discussion!

Photograph of Chris Stucker

Chris Stucker, Associate Director for Identity and Access Management, University of Utah

Chris started his career as a US Army Intelligence officer. Since his departure from that life, he has worked in a variety of IT and security roles in both the private and public sector, primarily in manufacturing, higher education, and health care. His current role involves a primary focus on the IAM program for a major University and Health Care system.

Photograph of Morey J. Haber

Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust

Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.