, –pm EDT with Morey J. Haber, Chief Security Advisor; Chris Stucker, Associate Director for Identity and Access Management, University of Utah
As cyberattacks continue to be prevalent, now more than ever it is important to protect your institution's infrastructure, and a reliable privileged access management (PAM) strategy can do just that. A strong PAM approach can help colleges and universities protect themselves from misuse of privileged access by streamlining the authorization and monitoring processes. The BeyondTrust platform unifies all PAM use cases into a solution that helps your campus reduce risk, achieve compliance, and boost operational performance.
Join our conversation with representatives from the University of Utah to discover how a complete PAM strategy will:
Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12 year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.
Chris started his career as a US Army Intelligence officer. Since his departure from that life, he has worked in a variety of IT and security roles in both the private and public sector, primarily in manufacturing, higher education, and health care. His current role involves a primary focus on the IAM program for a major University and Health Care system.