Speaker details

Morey J. Haber

Chief Security Officer


Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.


Date Title

Cybersecurity Leadership Summit 2020

Nov 10, 2020
Panel - Zero Trust Paradigm for the Future of Security
Nov 10, 2020
Identity Attack Vectors: The Concept, the Book and the Authors

The Three Fundamentals to Enterprise Identity Success

Sep 03, 2020
10 Steps to Universal Privilege Management
Sep 03, 2020
Panel Discussion - The Road to Enterprise Identity Success

CyberNext Summit 2019

Oct 10, 2019
Privileged Access Management
How to Move from Always-on Privileged Access to Just-in-Time Administration and Drastically Reduce Your IT Security Risk
Oct 10, 2019
Zero Trust Security & Strong Authentication
Panel - The Movement of Security Controls to the Cloud - How Far Can We Go?

European Identity & Cloud Conference 2019

May 15, 2019
Access Management & Security
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
May 15, 2019
Privileged Access Management
Panel: Leveraging Privileged Access Management Solutions for Enterprise

 Blog posts

10 Use Cases for Universal Privilege Management
Blog post