In light of the recent high-profile social media account breaches, organizations are strategizing how to better protect their own social media accounts (Twitter, LinkedIn, Facebook, Instagram, Tik Tok, etc.). Threat actors have long been using ransomware and phishing attacks to gain access and compromise enterprise accounts. In almost every instance, this involves the exploitation of privileges/privileged access. This is no difference when it comes to threats against social media accounts. Locking down privileges across the entire organization -- including social media accounts -- has never been more critical from protecting against both external and internal threats.

Join Sami Laiho, one of the world's leading professionals in the Windows OS and Security, and learn how to protect your company's social accounts (and reputation!) in the constantly evolving digital world. Sami will also discuss:

  1. The evolution of cybercrime
  2. Real-life examples of internal threats
  3. Best practices in protecting online social accounts

While it is a hard truth that little can be done to protect an organization when the SaaS vendor and its employees are breached, there are myriad security best practices that can be enacted to mitigate the risks of a privileged attack vector and inappropriate account access. BeyondTrust CTO and CISO, Morey Haber, shares his security best practices around privileged access management.

Photograph of Morey J. Haber

Morey J. Haber, Chief Security Advisor

Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Photograph of Sami Laiho

Sami Laiho, Windows OS & Security Expert, Senior Technical Fellow

Sami Laiho is one of the world’s leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security since 1996.

In 2019 Sami was chosen by TiVi-magazine as one of the top 100 influencers in IT in Finland. He is the 11th most followed person in his field in Finland.

At Ignite 2018, Sami’s “Behind the Scenes: How to build a conference winning session” and “Sami Laiho: 45 Life Hacks of Windows OS in 45 minutes” sessions were ranked as #1 and #2 out of 1708 sessions!! This was the first time in the history of the conference that anyone has been able to do this.

Before that, at Ignite 2017, the world’s biggest Microsoft event, Sami was evaluated as the Best External Speaker! Also, Sami’s sessions were evaluated as the Best session in TechEd North America, Europe and Australia in 2014, and Nordic Infrastructure Conference in 2016, 2017 and 2019.

Prefers reduced motion setting detected. Animations will now be reduced as a result.