Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreWatch the replays from our 2023 conference now!
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
, with Morey J. Haber, Chief Security Officer, BeyondTrust
The more the traditional perimeter continues to blur, the more zero trust comes into focus. The seismic shift to the cloud has also accelerated the demise of the traditional perimeter and the emergence of new security threats that organizations need to identify and protect against. NIST Special Publication 800-207 provides a playbook for organizations seeking guidance on how to adopt a Zero Trust architecture. This approach reduces the threat surface and helps to minimize the threat windows during which attackers can inflict damage. In addition to the NIST approach, organizations can further adopt Zero Trust principles by leveraging an identity-centric zero trust path, further helping to protect against everything from simple malware to advanced persistent threats.
Many organizations have begun to embrace Zero Trust frameworks and are building these into their security strategies. Understanding your barriers to Zero Trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support Zero Trust.
In this session you will learn.
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.