Upcoming Webinar

Top Cybersecurity Trends & Predictions: A Look Into 2025 & Beyond

November 7th, 2024, 9:00am PT/12:00pm ET

  • Morey J. Haber
  • Christopher Hills
  • James Maude
  • Michael Machado

Member Sponsor:

Top Cybersecurity Trends & Predictions: A Look Into 2025 & Beyond

As we approach the end of 2024 and reach the midpoint of the roaring twenties, this decade has undoubtedly challenged us with a variety of issues, from cyber threats to global health crises. With 2025 on the horizon, it’s an ideal moment to reflect on the cybersecurity trends that have emerged in recent years and to begin strategizing for what lies ahead.

Be sure to join us where we will explore the leading cybersecurity trend predictions for 2025.

Attendees Will Learn:

Insights on key forecasts for 2025 and discuss the major trends expected to gain momentum as this decade progresses.
During this session, our knowledgeable panel will cover topics such as:
  • The AI Threat – has it truly met expectations?
  • Quantum Computing Threats – separating theory from reality
  • Hidden “Paths to Privilege™” – a new battleground
  • And much more!
Attendees will leave this session armed with vital information about the innovations poised to reshape the cybersecurity landscape in 2025 and beyond. Additionally, if you’re looking to bolster your cybersecurity practices, we’ll provide valuable resources to help you embark on your journey immediately!

Who Should Attend:

  • Chief Information Security Officer (CISO)
  • Chief Technology Officer (CTO)
  • Chief Information Officer (CIO)
  • Security Architect
  • Security Engineer
  • Systems Administrator
  • Network Administrator
  • IT Manager
  • Compliance Officer
  • Risk Manager

The Panelists

Morey J. Haber

Chief Security Advisor, BeyondTrust

Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Christopher Hills

Chief Security Strategist, BeyondTrust

Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy. Chris has held the Sr Solution’s Architect, Deputy CTO, and Deputy CISO roles since starting with BeyondTrust. Chris is also co-author in the Cloud Attack Vectors book, a contributor in the New Privileged Attack Vectors book, and editor in previous books. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s college football career, going to the sand dunes off-roading.

James Maude

Field Chief Technology Officer, BeyondTrust

James Maude is the Field Chief Technology Officer (FCTO) at BeyondTrust. With his broad experience in security research, both in academia and industry, James has spent the past decade analyzing cyber threats to identify attack vectors and trends in the evolving security landscape. He is an active member of the security community and hosts Adventures of Alice and Bob, a podcast that shines a light on the people making a difference in security. As an expert voice on cybersecurity, he regularly presents at international events and hosts webinars to discuss threats and defense strategies.

Michael Machado

Chief Identity Security Officer, BeyondTrust

Michael Machado is an experienced security leader with more than twenty years of success in global companies ranging in size from pre-IPO to Fortune 100. As Chief Information Security Officer, he is responsible for the strategic planning, governance, and operational oversight of BeyondTrust’s information security program. He has extensive experience developing and leading security programs at high-growth technology companies. Mike’s prior roles include serving as Chief Data and Security Officer at Shippo, where he led their cybersecurity, fraud prevention, and data functions, and as RingCentral’s inaugural Chief Security Officer, where he planned and executed the company’s cybersecurity, fraud prevention, and trust strategies from pre-IPO through $1.3 billion in revenue. He also held various security leadership positions at both Cisco and WebEx. Mike holds a Bachelor of Science in Business Information Systems from the University of Phoenix, Carnegie Mellon’s Chief Data Officer executive education certificate, and multiple security certifications.

Related Webinars

On Demand Webinar

On Demand Webinar

How to Successfully Leverage AI Game-Changers Powering Identity Governance

Member Sponsor

On Demand Webinar

On Demand Webinar

Identity Management Day 2024 Preview

Member Sponsor

On Demand Webinar

On Demand Webinar

The Significance of Identity Security

Member Sponsor
Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.