Get best-in-class privileged account and session management, secrets management, and secure remote access to everything, at an unprecedented value.Learn More Learn More
Get a closer look inside the BeyondTrust identity & access security arsenal.Learn More Learn More
Find out how customers & analysts alike review BeyondTrust.Learn More Learn More
Our biggest customer conference of the year is happening in Miami and virtually on May 1-5, 2023.Learn More Learn More
Find out more about our integrations.Learn More Learn More
Learn how BeyondTrust solutions protect companies from cyber threats.Learn More Learn More
Search the knowledge base for answers to FAQs & more.Learn More Learn More
, –pm with featured guest, Jessica Burn, Forrester Research, Inc. Senior Analyst
At its core, a successful Zero Trust journey aspires to eliminate persistent trust, and enforce continuous authentication, least privilege, and provide ephemeral access to resources. This approach reduces the attack surface and minimizes the threat windows during which attackers can inflict damage, while helping to protect against a wide range of modern attacks.
But the reality for most organizations is that the journey to achieve a Zero Trust model across their organization is far from trivial. Understanding the barriers to implementation, learning from the success of others, and the tools available to help you deliver a Zero Trust strategy, will enable you to develop your best route to success.
Covered key topics will include:
Jess is a senior analyst at Forrester serving security and risk professionals. She contributes to Forrester’s research on the role of the CISO and Zero Trust. Additionally, Jess covers continuous controls monitoring; incident response and crisis management; and security training, education, and certification.
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.