Identity First Security
Facebook X LinkedIn

Cyber-Defense Strategies to Protect Cloud Resources & Identities

Combined Session
Wednesday, May 10, 2023 11:40—12:00
Location: A 03-04

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Attackers have also realigned their efforts, focusing on staying undetected, quickly monetizing exploitations, and publicly shaming organizations after successful breaches. BeyondTrust Chief Security Officer (CSO), Morey J. Haber will offer best practices for minimizing these increasingly exploited cloud attack vectors. Join him to learn cutting edge strategies for building the optimal cloud defense for your organizations unique cloud environment and identities.

Cyber-Defense Strategies to Protect Cloud Resources & Identities
Event Recording
Cyber-Defense Strategies to Protect Cloud Resources & Identities
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Cyber-Defense Strategies to Protect Cloud Resources & Identities
Presentation deck
Cyber-Defense Strategies to Protect Cloud Resources & Identities
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Morey J. Haber
Morey J. Haber
BeyondTrust
Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT...
Subscribe for updates
Please provide your email address