Michael Byrnes is the Director, Solutions Engineer iMEA for BeyondTrust. He has acquired a wealth of cyber security experience in a number of engagements over the last 10 years with a diverse set of IT companies across the Middle East. Thanks to his various roles as a security consultant, a systems engineer or within pre-sales, he gained extensive expertise in network and information security,
architecture design and virtualization. Within his current position at BeyondTrust, Michael manages the solution engineers’ team in the Middle East, India and Africa. With his group, he engages and advises partners, customers and prospects in their Privileged Access Management (PAM) strategy to secure and manage their entire universe of privileges.
Speech Topic & Synopses
Zero Trust: Getting Least Privilege Right, Finally
Zero Trust has become one of these buzz words. But what is actually behind? Decrypt the concept with Michael Byrnes, Director of Solutions Engineering iMEA at BeyondTrust, and Saqer Aqra, Solutions Engineer, and leave this session with practical takeaways and solid answers.
The more the traditional perimeter blurs or dissolves, the more zero trust comes into focus. At its core, zero trust aspires to eliminate persistent trust, and enforce continuous authentication, least privilege, and microsegmentation. This approach reduces the threat surface and also minimizes the threat windows during which attackers can inflict damage, helping to protect against everything from simple malware to advanced persistent threats while facilitating compliance with regulatory frameworks such as SAMA and NCA.
The reality is, for most organizations, achieving a 100% zero-trust state is a pipe dream. However, any implementation of zero trust controls should substantively help minimize your attack surface and cyber risk. Understanding your barriers to zero trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support zero trust.
In the session, our speaker will explore on:
- What is behind the concept of Zero Trust
- The goals of Zero Trust
- Roadblocks to Zero Trust (legacy architectures and technologies)
- How Privileged Access Management aligns with and enables Zero Trust
If you’re ready to cut through zero trust myths and clearly grasp what it will take for you to improve zero trust security controls, and how your organization stands to benefit, this event is for you!
BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry’s most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.
BeyondTrust protects all privileged identities, access, and endpoints across your IT environment from security threats, while creating a superior user experience and operational efficiencies. With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.