Event Recording

Cyber-Defense Strategies to Protect Cloud Resources & Identities

Show description
Speaker
Morey J. Haber
Chief Security Officer
BeyondTrust
Morey J. Haber
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Cloud Attack Vectors, Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group...
View profile
Playlist
European Identity and Cloud Conference 2023
Event Recording
The Yin and Yang of Zero Trust Policy-Based Automation
Event Recording
Identity Data, Observability & Analytics - The Road to Identity First Security
Event Recording
Identity Governance with a Purpose – Deciding and Documenting Why Access is Granted
Event Recording
From A (ACLs) to Z (Zanzibar): Standardizing Access Policies with IDQL/Hexa
Event Recording
eIDAS 2.0 & EU Digital Identity Wallet - Potential, Challenges, Use Cases
Event Recording
Preparations for Smoother PAM Flight
Event Recording
Defending Cross-Device flows against Illicit Consent Grant Attacks
Event Recording
The European Union Goes Decentralized - Standards and Technical Architecture Behind eIDAS V2
Event Recording
Rethinking Cloud Access Management
Event Recording
Building Identity Bridges: Where Digital Identity and People's Expectations Meet.