Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreWatch the replays from our 2023 conference now!
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
with Raef Meeuwisse, Cybersecurity Expert and Author
The Zero Trust framework is simple: Trust No One. But… can you trust a password?
Passwords are shared, stolen, and reused between personal and work machines without rest - making them a tempting (and easy) target for hackers. Is a password-based environment negatively impacting your Zero Trust program?
We’ll find out in this session with cybersecurity expert Raef Meeuwisse (author of Cybersecurity for Beginners and other titles) who will condense his experience and research into a 45-minute session that will cover how to expand your Zero Trust strategy and how Zero Trust has the potential to reduce or even eliminate the password problem.
Raef will also cover:
Raef Meeuwisse is one of the most popular authors in the field of cyber-security and social engineering. Raef’s titles include the global best-seller, ‘Cybersecurity for Beginners’, the frequently evolving ‘Cybersecurity to English Dictionary’ and ‘How to Hack a Human’; an exploration of how easily us humans can be controlled and influenced. His experience includes running eight digit security budgets, consulting on security at over 50 different organisations, designing a multi-million-pound security software platform, training as a hypnotist (yes, you read that correctly) and occasionally flying helicopters.
In addition to making public appearances at countless conferences across Europe, the UK and the US, he is also a frequent provider of commentary for multiple technologies and mainstream news outlets and has appeared in Infosec magazine, ZDNet, TechTarget, TEISS and on Sky News.