Identity First Security
Facebook Twitter LinkedIn

Cyber-Defense Strategies to Protect Cloud Resources & Identities

Combined Session
Wednesday, May 10, 2023 11:40—12:00
Location: A 03-04

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Attackers have also realigned their efforts, focusing on staying undetected, quickly monetizing exploitations, and publicly shaming organizations after successful breaches. BeyondTrust Chief Security Officer (CSO), Morey J. Haber will offer best practices for minimizing these increasingly exploited cloud attack vectors. Join him to learn cutting edge strategies for building the optimal cloud defense for your organizations unique cloud environment and identities.

Cyber-Defense Strategies to Protect Cloud Resources & Identities
Event Recording
Cyber-Defense Strategies to Protect Cloud Resources & Identities
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Cyber-Defense Strategies to Protect Cloud Resources & Identities
Presentation deck
Cyber-Defense Strategies to Protect Cloud Resources & Identities
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Morey J. Haber
Morey J. Haber
BeyondTrust
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Cloud Attack Vectors, Privileged Attack Vectors, Asset...

Tickets

On-Demand Access
Re-live EIC 2023
€500
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address