Cyber Security Weekly Podcast

Episode 208 - Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations - Interview with Morey Haber, CTO & CISO, BeyondTrust


Listen Later

Listen to the Podcast for a special book giveaway and one-on-one briefing. Still Open.
Interview with Morey Haber, CTO & CISO, BeyondTrust on the launch of the 2nd edition of his first book, “Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations”. The first edition was a best-seller on Amazon when it was launched 3 years ago.
Since then, the world has changed, Morey felt the need to write a second edition to cover brand new concepts in cyber-security that will help CISOs and their teams to better protect their organizations from the ever increasing cyber-attacks – such as “Just-in-Time PAM” and “Universal Privileged Management” – concepts that prompted global analyst firms to recommend Privileged Access Management as the number one priority for CISOs.
Morey wears "two hats" at BeyondTrust in his positions of Chief Technology Officer and Chief Information Security Officer. In order to keep his own organization secure from the ever increasing cyber-attacks as well as contribute to BeyondTrust's innovative product roadmap, he utilizes the lessons acquired over almost three decades of experience in IT and cyber-security.
To date, he’s authored three books, "Privileged Attack Vectors", "Asset Attack Vectors", and "Identity Attack Vectors"; and oversees BeyondTrust's global strategy for privileged access management and remote access solutions. 
“Privileged Attack Vectors (2nd Edition)” details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. It is the perfect read for any cyber-security professional.
Listen to the Podcast for a special book giveaway and one-on-one briefing.
For further information on Universal Privilege Management (https://www.beyondtrust.com/solutions/universal-privilege-management) or click here for a special book competition (https://www.beyondtrust.com/events/usergroups/apj-beyondtrust-special-book-competition) “Identity Attack Vectors” direct with Beyondtrust.
FURTHER LISTENING
Episode 183 - Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution – Interview with author Morey Haber, CISO & CTO, BeyondTrust https://blubrry.com/mysecurity/53901560/episode-183-identity-attack-vectors-implementing-an-effective-identity-and-access-management-solution-interview-with-author-morey-haber-ciso-cto-beyondtrust/ (https://blubrry.com/mysecurity/53901560/episode-183-identity-attack-vectors-implementing-an-effective-identity-and-access-management-solution-interview-with-author-morey-haber-ciso-cto-beyondtrust/)
Episode 176 - Privileged Access Management (PAM) and analysis of the BeyondTrust Microsoft Vulnerabilities Report 2019
...more
View all episodesView all episodes
Download on the App Store

Cyber Security Weekly PodcastBy MySecurity Media

  • 3.9
  • 3.9
  • 3.9
  • 3.9
  • 3.9

3.9

19 ratings


More shows like Cyber Security Weekly Podcast

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,979 Listeners

Risky Business by Patrick Gray

Risky Business

365 Listeners

Future Tense by ABC listen

Future Tense

73 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

366 Listeners

Politics Now by ABC listen

Politics Now

104 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

312 Listeners

Click Here by Recorded Future News

Click Here

413 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,879 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

166 Listeners

If You're Listening by ABC listen

If You're Listening

313 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

A Bit of Optimism by Simon Sinek

A Bit of Optimism

2,186 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners

The TED AI Show by TED

The TED AI Show

46 Listeners