On Demand Webinar

Countering the Attack: How Zero Trust is Pushing Back Against New Cyberthreats

Morey J. Haber

Chief Security Advisor, BeyondTrust

Member Sponsor:

Countering the Attack: How Zero Trust is Pushing Back Against New Cyberthreats

With the dramatic increase in the occurrence of sophisticated and high-profile cyberattacks evidencing an evolving threatscape that is both sprawling beyond its former perimeters and leading to the emergence of new, malicious threat tactics, the push to revamp cybersecurity processes and re-focus security beyond the perimeter has become imperative. In their Special Publication, 800-207, Zero Trust Architecture, NIST points to identity as the critical first step to regaining control over the perimeter, and to Zero Trust as the best security architecture for meeting the requirements of hybrid, cloud, and often multi-cloud network infrastructures.

NIST characterizes Zero Trust as an evolving collection of cybersecurity paradigms and concepts that allow security defenses to shift from functioning as static, network-based perimeters to functioning as perameterless defenses that work to continuously authenticate and verify users, devices, and applications. Guided by the two core mantras of “Assume breach” and “Never trust, always verify”, and built on a foundation of cybersecurity paradigms that include enforcing continuous authentication, eliminating persistent trust, implementing the least privilege, enforcing segmentation and micro-segmentation, and ensuring visibility, Zero Trust can help organizations reduce the attack surface, prevent unauthorized access to data and services, and control the impact threshold of any threat that does present itself to the network.

What Will You Learn?

  • Why Zero Trust is more than a buzzword when it comes to preventing a cyberattack
  • What organizations need to know to distinguish Zero Trust as a concept from a functional Zero Trust Architecture
  • How to build a strategic and achievable pathway to Zero Trust
  • The 8 Ways Privileged Access Management (PAM) can enable Zero Trust

Who Should Attend?

  • Director of Security Operations
  • Security Operations Manager
  • Security Analyst
  • Security Operations Engineer
  • Security Operations Specialist
  • IT Security Engineer
  • System Administrator
  • Data Analyst
  • Management Information Systems Director
  • Technical Operations Officer
  • Operations Manager
  • Service Desk Manager
  • Compliance Analyst
  • Audit and Compliance Manager
  • Compliance Officer
  • Business Operations Analyst
  • Director of Compliance
  • Chief Information Officer
  • Chief Information and Security Officer
  • Director of IT Security
  • IAM Manager
  • Director of Identity Management
  • Security Architect Compliance Manager/Director
  • Risk analyst
  • IT Director
  • VP of IT
  • VP of Technology
  • Director of Information Systems

Note: The IDSA is an approved (ISC)2 CPE Submitter Partner. To receive CPE credits, submit the viewing certificate to (ISC)2 or submit your information. Make sure to check out our other identity-centric security webinars from leading identity and security experts.

The Panelists

Morey J. Haber

Chief Security Advisor, BeyondTrust

Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Related Webinars

On Demand Webinar

On Demand Webinar

Navigating IAM Leadership Challenges and Opportunities

Member Sponsor

Upcoming Webinar

On Demand Webinar

Beyond Boundaries: Revolutionizing Identity Security from On-Premises Environments to the Cloud

January 23rd, 2025, 9:00am PT/12:00pm ET

Member Sponsor

On Demand Webinar

On Demand Webinar

Cybersecurity Challenges of 2025: Uncovering the Role of Digital Identities

Member Sponsor
Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.