Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreWatch the replays from our 2023 conference now!
Learn More Learn MoreFind out more about our extensive partner & integration network.
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
, –pm with Scott Takaoka, Vice President, Cyber Solutions Group at Aon
The blistering pace and expanding scope of cyberthreats and ransomware attacks is forcing cyber insurance companies to steeply increase their rates and premiums, and even drop coverage for high-risk organizations. Underwriting requirements to be approved for cyber insurance are becoming more stringent.
In this on-demand webinar, Vice President, Cyber Solutions Group at Aon, Scott Takaoka, covers the current state of Cyber Liability Insurance and how carriers consider and cover cyber risk. BeyondTrust CSO, Morey Haber, then joins in and share his own experience of going through the cyber insurance coverage process and the lessons learned. Additionally, Scott and Morey discuss:
Learn how implementing Privileged Access Management (PAM) can enable your organization to not only reduce your cyber risk and improve operational performance, but also qualify for cyber insurance, or lower existing premiums.
All attendees will receive the BeyondTrust Cybersecurity Insurance Checklist as a guide in understanding the common requirements for cyber insurance approval.
Scott Takaoka is responsible for developing and growing the firm’s relationships with enterprise clients, helping them identify, characterize and proactively manage their cyber risk and increasing their resilience to cyber events. Scott is a part the Aon Cyber Solutions Group, comprised of cyber liability insurance brokers, cyber security consultants, digital forensic/incident response practitioners and cyber risk analysts, providing a comprehensive solution portfolio to assist clients with their cyber risk management challenges. With this holistic approach, Aon helps its clients understand and characterize their current levels of cyber risk, then provides risk transfer and risk mitigation solutions should their current risk levels exceed their appetite for such risks.
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.