Morey J. Haber

Morey J. Haber

Company: BeyondTrust

Job Title: Chief Technology Officer

Twitter LinkedIn

With more than 20 years of IT industry experience, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and key customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.

Morey J. Haber Seminars

  • Privileged Attack Vectors - Building Effective Defence Strategies to Protect Organizations Wed 26th Sep 09:30 - 10:20

    Privileged Attack Vectors - Building Effective Defence Strategies to Protect Organizations

    Cyber-attacks continue to increase in volume and sophistication. As a result data breaches are no longer surprising or even news worthy. It’s not a matter of if, but a matter of when you will be successfully breached. This session will provide a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors and how you can properly take measurable steps to defend against them.

    Speaker

    Morey J. Haber

    Morey J. Haber

    Time / Place

    Wed 26th Sep 09:30 to 10:20

    Cyber Hack Theatre

  • Privileged Attack Vectors - Building Effective Defence Strategies to Protect Organizations Thu 27th Sep 09:30 - 10:00

    Privileged Attack Vectors - Building Effective Defence Strategies to Protect Organizations

    Cyber-attacks continue to increase in volume and sophistication. As a result data breaches are no longer surprising or even news worthy. It’s not a matter of if, but a matter of when you will be successfully breached. This session will provide a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors and how you can properly take measurable steps to defend against them.

    Speaker

    Morey J. Haber

    Morey J. Haber

    Time / Place

    Thu 27th Sep 09:30 to 10:00

    Network Security and Ransomware Theatre

Top