Listen to the Podcast for a special book giveaway and one-on-one briefing. Still Open.
Interview with Morey Haber, CTO & CISO, BeyondTrust on the launch of the 2nd edition of his first book, “Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations”. The first edition was a best-seller on Amazon when it was launched 3 years ago.
Since then, the world has changed, Morey felt the need to write a second edition to cover brand new concepts in cyber-security that will help CISOs and their teams to better protect their organizations from the ever increasing cyber-attacks – such as “Just-in-Time PAM” and “Universal Privileged Management” – concepts that prompted global analyst firms to recommend Privileged Access Management as the number one priority for CISOs.
Morey wears “two hats” at BeyondTrust in his positions of Chief Technology Officer and Chief Information Security Officer. In order to keep his own organization secure from the ever increasing cyber-attacks as well as contribute to BeyondTrust’s innovative product roadmap, he utilizes the lessons acquired over almost three decades of experience in IT and cyber-security.
To date, he’s authored three books, “Privileged Attack Vectors”, “Asset Attack Vectors”, and “Identity Attack Vectors”; and oversees BeyondTrust’s global strategy for privileged access management and remote access solutions.
“Privileged Attack Vectors (2nd Edition)” details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. It is the perfect read for any cyber-security professional.
Listen to the Podcast for a special book giveaway and one-on-one briefing.
Episode 183 – Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution – Interview with author Morey Haber, CISO & CTO, BeyondTrust https://blubrry.com/mysecurity/53901560/episode-183-identity-attack-vectors-implementing-an-effective-identity-and-access-management-solution-interview-with-author-morey-haber-ciso-cto-beyondtrust/
Episode 176 – Privileged Access Management (PAM) and analysis of the BeyondTrust Microsoft Vulnerabilities Report 2019 https://blubrry.com/mysecurity/51406933/episode-176-privileged-access-management-pam-and-analysis-of-the-beyondtrust-microsoft-vulnerabilities-report-2019/
Episode 172 – Privileged Access Management (PAM) with BeyondTrust CISO & CTO, Morey Haber https://blubrry.com/mysecurity/48710291/episode-172-privileged-access-management-pam-with-beyondtrust-ciso-cto-morey-haber/
Episode 148 – Privileged Access Management, SingHealth Breach & Beyond Trust solution addressing ASD Top4 – Essential 8 https://blubrry.com/mysecurity/43342483/episode-148-privileged-access-management-singhealth-breach-beyond-trust-solution-addressing-asd-top4-essential-8/