Many Universities have diverse and robust user populations. Just think of all the attributes, roles and access needed for undergrad and graduate students, facility, teachers, university hospitals or healthcare systems, and more. This complex network of users, admins, and accounts requires a complete Privileged Access Management (PAM) solution that protects and manages the many different types of privileged accounts within the Higher Ed system.

That’s why one major University turned to BeyondTrust to implement a Just-in-Time Privileged Access Management (JIT PAM) model to enforce true “least privilege.” JIT PAM is a model that ensures users, processes, applications, systems, etc. have “just enough” privileged access when needed, and for the least amount of time necessary.

Join Chris Stucker, Associate Director for Identity and Access Management, University of Utah, as he shares his experience around a JIT PAM implementation and Universal Privilege Management (UPM) approach to security. Chris will discuss how JIT PAM:

BeyondTrust’s CTO and CISO Morey Haber will also cover how BeyondTrust’s Universal PAM approach aligns with NIST-CSF to help universities mitigate insider threats (NIST-CSF Protect), achieve compliance, and receive federal funding and competitive grants.

You won’t want to miss out on this discussion!

Photograph of Chris Stucker

Chris Stucker, Associate Director for Identity and Access Management, University of Utah

Chris started his career as a US Army Intelligence officer. Since his departure from that life, he has worked in a variety of IT and security roles in both the private and public sector, primarily in manufacturing, higher education, and health care. His current role involves a primary focus on the IAM program for a major University and Health Care system.

Photograph of Morey J. Haber

Morey J. Haber, Chief Security Officer, BeyondTrust

Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Prefers reduced motion setting detected. Animations will now be reduced as a result.