Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
with Christopher Hills, Chief Security Strategist, BeyondTrust
In session we delve into the difficulties encountered by cybersecurity leaders in effectively managing security risks within intricate and ever-changing environments. The discussion will specifically address challenges posed by modern day working such as
We were pleased to have Chris Hills, Chief Security Strategist at BeyondTrust, as our speaker. Chris will provide valuable insights on emerging market trends related to identity and privilege, as well as the principles of zero trust security. Additionally, shares a decade's worth of Microsoft vulnerability knowledge and shed light on the constantly evolving cyber insurance market.
Furthermore, Chris explores the composition of Privilege Access Management and its significance as a risk mitigation strategy. Attendees will gain a comprehensive understanding of what privilege access management entails and the key factors to consider when implementing it.
We encourage you to watch this informative session, which promises to offer valuable insights into the complex world of cybersecurity risk management.
Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy. Chris has held the Sr Solution’s Architect, Deputy CTO, and Deputy CISO roles since starting with BeyondTrust. Chris is also co-author in the Cloud Attack Vectors book, a contributor in the New Privileged Attack Vectors book, and editor in previous books. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s college football career, going to the sand dunes off-roading.