Get best-in-class privileged account and session management, secrets management, and secure remote access to everything, at an unprecedented value.
Learn More Learn MoreGet a closer look inside the BeyondTrust identity & access security arsenal.
Learn More Learn MoreFind out how customers & analysts alike review BeyondTrust.
Learn More Learn MoreOur biggest customer conference of the year is happening in Miami and virtually on May 1-5, 2023.
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreSearch the knowledge base for answers to FAQs & more.
Learn More Learn Morewith Tom O'Neill, Management Liability Coverage Specialist, Fred C. Church; Morey J. Haber, Chief Security Officer, BeyondTrust
FROM PREPARATION TO RESTORATION—A FOUR-PART WEBINAR SERIES
In Part 1 of our cyber claims series, we learned four critical action steps businesses should take before a cyber incident occurs, including the importance of having a well-thought-out cyber incident response plan. Then, in Part 2, we shared what you need to know to save time and money when navigating the claims process.
The third installment of our series goes deeper into the claims process and focuses on forensic analysis or the gathering of digital evidence to uncover how a bad actor accessed your network and what it’s going to take to get them out.
Tom O’Neill, Fred C. Church's management liability coverage specialist, will be presenting Part 3 together with his guest Morey Haber, chief security officer at BeyondTrust.
During the webinar, Tom and Morey will help you understand:
Tom O'Neill joined Fred C. Church in 2019 as the coverage specialist for Cyber, Management Liability, and Professional Liability coverage lines. In coordination with the commercial insurance client executives, he regularly consults with clients about their risk management strategies and cybersecurity mitigation efforts.
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.