Get best-in-class privileged account and session management, secrets management, and secure remote access to everything, at an unprecedented value.Learn More Learn More
Get a closer look inside the BeyondTrust identity & access security arsenal.Learn More Learn More
Find out how customers & analysts alike review BeyondTrust.Learn More Learn More
Our biggest customer conference of the year is happening in Miami and virtually on May 1-5, 2023.Learn More Learn More
Find out more about our integrations.Learn More Learn More
Learn how BeyondTrust solutions protect companies from cyber threats.Learn More Learn More
Search the knowledge base for answers to FAQs & more.Learn More Learn More
, –pm with Chris Stucker, Associate Director for Identity and Access Management, University of Utah; Morey J. Haber, Chief Security Officer, BeyondTrust
This webinar is a part of the EDUCAUSE Industry & Campus Solutions series.
As the evolving threat landscape continues to grow in complexity, so does the volume of intellectual property, attributes, and privileged identities within college and university systems. Securely managing access controls for undergraduate and graduate students, facility, university hospitals, healthcare systems, and more can be an intricate task. Colleges and universities have robust user populations, and this multifaceted network of users, admins, and accounts requires a complete privileged access management (PAM) strategy that secures the many different privileged accounts within higher ed. Recent cyberbreach news is a reminder that privileged credentials are highly targeted by threat actors and need to be protected at all times. BeyondTrust's Universal PAM approach aligns with NIST-CSF to help colleges and universities mitigate internal and external threats (NIST-CSF Protect), achieve compliance, and receive federal funding and competitive grants.
Chris started his career as a US Army Intelligence officer. Since his departure from that life, he has worked in a variety of IT and security roles in both the private and public sector, primarily in manufacturing, higher education, and health care. His current role involves a primary focus on the IAM program for a major University and Health Care system.
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.
Because this webinar is hosted by EDUCAUSE, you'll register on their site.Go to registration page