, – pm CET with Martin Kuppinger, Principal Analyst KuppingerCole; Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust
Join these Zero Trust experts as they discuss the most important issues surrounding the implementation of this model of security. Martin Kuppinger will lead the discussion around the key elements of Zero Trust, the business benefits – especially in the post-Covid era of increased working from home, and the most common barriers to implementation.
Morey Haber, who has more than 25 years of IT industry experience and oversees BeyondTrust’s strategy for Privileged Access Management (PAM) and remote access solutions, will bring a wealth of knowledge and experience to the discussion, especially around how PAM solutions can help organizations to implement Zero Trust successfully.
How to achieve Least Privilege and Secure Remote Access with a Zero Trust strategy
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.
A good understanding of the barriers to implementation and the tools that can help is essential to enabling organizations to discover their best route to securing their environments and minimizing risk, according to Martin Kuppinger, Principal Analyst at KuppingerCole and Morey Haber, CTO & CISO at BeyondTrust.
Join this webinar to:
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known as a widely-read columnist and author of technical articles and reviews in some of the most prestigious IT magazines in Germany, Austria and Switzerland. He is also a well-established speaker and moderator at seminars and congresses. His interest in Identity Management dates back to the 80ies, when he also gained considerable experience in software architecture development. Over the years, he added several other fields of research, including virtualization, cloud computing, overall IT security, and others. Having studied economies, he combines in-depth IT knowledge with a strong business perspective.
Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.