Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
with Morey J. Haber, Chief Security Advisor
So how did 2023 go for you? Feeling prepared for 2024?
We get asked all the time to analyze the trends that emerged for the year and how to prepare for those that may lie ahead. Watch this webinar with BeyondTrust’s Chief Security Officer, Morey Haber, Chief Security Strategist, Chris Hills and Director of Research, James Maude where they'll dive into some of their top cybersecurity predictions and forecasts for 2024 and even glimpse into the trends they anticipate will shape the cyber landscape within the next 5 years.
In this session, our expert panel will discuss:
You'll leave this session with valuable insights into the anticipated advancements that are poised to shape the cybersecurity landscape in 2024 and beyond. And if you’re looking to get proactive about your cybersecurity posture, we'll provide resources on where you can get started today!
Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.
Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy. Chris has held the Sr Solution’s Architect, Deputy CTO, and Deputy CISO roles since starting with BeyondTrust. Chris is also co-author in the Cloud Attack Vectors book, a contributor in the New Privileged Attack Vectors book, and editor in previous books. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s college football career, going to the sand dunes off-roading.
James Maude is the Director of Research at BeyondTrust’s Manchester, U.K., office. James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.