Many Universities have diverse and robust user populations. Just think of all the attributes, roles and access needed for undergrad and graduate students, facility, teachers, university hospitals or healthcare systems, and more. This complex network of users, admins, and accounts requires a complete Privileged Access Management (PAM) solution that protects and manages the many different types of privileged accounts within the Higher Ed system.

That’s why one major University turned to BeyondTrust to implement a Just-in-Time Privileged Access Management (JIT PAM) model to enforce true “least privilege.” JIT PAM is a model that ensures users, processes, applications, systems, etc. have “just enough” privileged access when needed, and for the least amount of time necessary.

Join Chris Stucker, Associate Director for Identity and Access Management, University of Utah, as he shares his experience around a JIT PAM implementation and Universal Privilege Management (UPM) approach to security. Chris will discuss how JIT PAM:

BeyondTrust’s CTO and CISO Morey Haber will also cover how BeyondTrust’s Universal PAM approach aligns with NIST-CSF to help universities mitigate insider threats (NIST-CSF Protect), achieve compliance, and receive federal funding and competitive grants.

You won’t want to miss out on this discussion!

Photograph of Chris Stucker

Chris Stucker, Associate Director for Identity and Access Management, University of Utah

Chris started his career as a US Army Intelligence officer. Since his departure from that life, he has worked in a variety of IT and security roles in both the private and public sector, primarily in manufacturing, higher education, and health care. His current role involves a primary focus on the IAM program for a major University and Health Care system.

Photograph of Morey J. Haber

Morey J. Haber, Chief Security Advisor

Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Want to learn why over 20,000 customers chose BeyondTrust?
Prefers reduced motion setting detected. Animations will now be reduced as a result.