Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
, –pm with Jay Beale, CEO, CTO at InGuardians, Inc.
Renowned hacker and cybersecurity expert, Jay Beale is BACK in another of his popular Linux Attack and Defense demo series. Tune in as Jay emulates an attacker to exploit vulnerabilities on a Linux machine.
Then, Jay will demonstrate a proactive defense that not only breaks the attack chain he launched earlier, but also fends off other possible hacks. Attendees will learn:
Don't miss this fun and useful webinar where you'll get the chance to hone both your attack and defend skills!
Jay Beale is CTO and CEO for InGuardians. He works on Kubernetes, Linux and Cloud-Native security, both as a professional threat actor and an Open Source maintainer and contributor. He's the architect of the open source Peirates attack tool for Kubernetes and Bustakube CTF Kubernetes cluster. Jay helps create and run DEF CON's Kubernetes CTF, is a member of the Kubernetes organization, and previously co-led the Kubernetes project's Security Audit Working Group. Since 2000, he has led training classes on Linux & Kubernetes security at public conferences and in private training.
David Faulk is a Sr. Solution Engineer at BeyondTrust with almost three years at the company. David started in Open Source software before moving into Cybersecurity. He enjoys Muay Thai, lifting weights, and Drones.