Get unparalleled visibility into identities, accounts, and privileged access — all in one interface.Learn More Learn More
Get a closer look inside the BeyondTrust identity & access security arsenal.Learn More Learn More
Find out how customers & analysts alike review BeyondTrust.Learn More Learn More
Our biggest customer conference of the year is happening in Miami and virtually on May 1-5, 2023.Learn More Learn More
Find out more about our integrations.Learn More Learn More
Learn how BeyondTrust solutions protect companies from cyber threats.Learn More Learn More
Search the knowledge base for answers to FAQs & more.Learn More Learn More
with Morey J. Haber, Chief Security Officer, BeyondTrust; Brian Chappell, Chief Security Strategist; Christopher Hills, Chief Security Strategist, BeyondTrust
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus―it is not a matter of if, but rather when an organization will be breached.
Threat actors typically target the path of least resistance. With the accelerating adoption of cloud technologies and remote work, those pathways are increasingly abundant.
Today’s attackers have realigned their efforts to capitalize, focusing on remaining undetected, quickly monetizing exploitations, and publicly shaming organizations after successful breaches.
In this session cybersecurity experts Morey J. Haber, Chief Security Officer, Brian Chappell, Chief Security Strategist, and Christopher Hills, Chief Security Strategist at BeyondTrust offer best practices for minimizing these new and increasingly exploited cloud attack vectors. Tune in to learn cutting edge strategies for building the optimal cloud defense for your organization’s unique cloud environment.
What You’ll Learn:
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.
Brian has more than 30 years of IT and cybersecurity experience in a career that has spanned system integrators, PC and Software vendors, and high-tech multi-nationals. He has held senior roles in both the vendor and the enterprise space in companies such as Amstrad plc, BBC Television, GlaxoSmithKline, and BeyondTrust. At BeyondTrust, Brian has led Sales Engineering across EMEA and APAC, Product Management globally for Privileged Password Management, and now focuses on security strategy both internally and externally. Brian can also be found speaking at conferences, authoring articles and blog posts, as well as providing expert commentary for the world press.
Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy reporting to the CSO. Chris has held the Deputy CTO and Deputy CISO role since starting with BeyondTrust. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s football career as a senior, going to the sand dunes and offroading.
Because this webinar is hosted by CSA: CloudBytes, you'll register on their site.Go to registration page