Saqer Aqra is a Solutions Engineer at BeyondTrust. Saqer came to BeyondTrust with a very strong experience in the cybersecurity area. He had indeed worked as a cybersecurity consultant and engineer in Saudi Arabia for 6 years and was able to develop multiple skills such as on Endpoint Detection and Response (EDR), encryption for emails and endpoints, Multi Factor Authentication (MFA), Privilege Identity & Access Management (PIM/PAM), Security Information and Event Management (SIEM) etc.
In his current role at BeyondTrust, Saqer can leverage his solid experience to provide optimal support and guidance to organizations in the Kingdom wishing to implement Privilege Access Management and Endpoint Protection solutions.
Speech Topic & Synopses
Zero Trust has become one of these buzz words. But what is actually behind? Decrypt the concept with Michael Byrnes, Director of Solutions Engineering iMEA at BeyondTrust, and Saqer Aqra, Solutions Engineer, and leave this session with practical takeaways and solid answers.
The more the traditional perimeter blurs or dissolves, the more zero trust comes into focus. At its core, zero trust aspires to eliminate persistent trust, and enforce continuous authentication, least privilege, and microsegmentation. This approach reduces the threat surface and also minimizes the threat windows during which attackers can inflict damage, helping to protect against everything from simple malware to advanced persistent threats while facilitating compliance with regulatory frameworks such as SAMA and NCA.
The reality is, for most organizations, achieving a 100% zero-trust state is a pipe dream. However, any implementation of zero trust controls should substantively help minimize your attack surface and cyber risk. Understanding your barriers to zero trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support zero trust.
In the session, our speaker will explore on:
- What is behind the concept of Zero Trust
- The goals of Zero Trust
- Roadblocks to Zero Trust (legacy architectures and technologies)
- How Privileged Access Management aligns with and enables Zero Trust
If you’re ready to cut through zero trust myths and clearly grasp what it will take for you to improve zero trust security controls, and how your organization stands to benefit, this event is for you!
BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry’s most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.
BeyondTrust protects all privileged identities, access, and endpoints across your IT environment from security threats, while creating a superior user experience and operational efficiencies. With a heritage of innovation and a staunch commitment to customers, BeyondTrust solutions are easy to deploy, manage, and scale as businesses evolve. We are trusted by 20,000 customers, including 75 of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.