On Demand Webinar

Why VPN Isn’t Enough: Supporting a Remote Workforce in the Post-COVID Era

Morey J. Haber

Chief Security Officer, BeyondTrust

Member Sponsor:

Why VPN Isn’t Enough: Supporting a Remote Workforce in the Post-COVID Era

With the rapid development of the Coronavirus (COVID-19) in 2020, many security professionals had to come up with disaster recovery (DR) plans and make quick decisions to allow remote work en masse. The goals: keep the organization productive during this crisis and ensure that any unacceptable security risks are not created in the process. While most DR plans focus on maintaining productivity in the face of a single catastrophic event, Coronavirus represents a long-term threat that might stretch the typical disaster recovery model to its brink of coverage.
Join Morey Haber, CTO/CISO of BeyondTrust and author of four cybersecurity books, in this webinar for practical guidance on how to quickly implement and scale strong security protocols to enable long-term remote work. He will also cover:

• Risks and Challenges of VPNs
• Shadow IT and free, or consumer-grade, tools
• Bring your own device (BYOD) in the Post-COVID Era
• Secure remote access & endpoint security – the foundation for effective remote working

Who Should Attend?

This webinar is for you if…

You are responsible for protecting the security of identities in your organization – employee, partner, third party or machine identities.

You are a security leader that will be held accountable if the organization experiences a data breach.

You are a security architect responsible for making sure that your identity and security technology investments are working together to make your organization more secure.

You are a security leader responsible for securing a remote workforce and addressing risks associated with  BYOD, Shadow IT and the use of free, or consumer-grade, tools.

You are a security architect responsible for providing secure remote access through VPN and/or endpoint security.

Note: The IDSA is an approved (ISC)2 CPE Submitter Partner. To receive CPE credits, submit the viewing certificate to (ISC)2 or submit your information. Make sure to check out our other identity-centric security webinars from leading identity and security experts.

The Panelists

Morey J. Haber

Chief Security Officer, BeyondTrust

Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition, where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Related Webinars

On Demand Webinar

On Demand Webinar

The Significance of Identity Security

Member Sponsor

On Demand Webinar

On Demand Webinar

Challenges and Pitfalls of IAM with Merger and Acquisition Activity

Member Sponsor

On Demand Webinar

On Demand Webinar

The Broken State of Least Privilege: Reimagining a New Approach

Member Sponsor
Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.