Navigating the Evolving Cybersecurity Landscape with Morey J. Haber

Morey J. Haber is the Chief Security Advisor at BeyondTrust. A veteran of the IT industry for more than 25 years, he is a recognized authority on cybersecurity. If knowledge is power, his deep knowledge informs his strategic vision. This combined experience makes him uniquely qualified to lead efforts to address modern threats such as…

Tina Reynolds Avatar

By

Navigating the Evolving Cybersecurity Landscape with Morey J. Haber

Morey J. Haber is the Chief Security Advisor at BeyondTrust. A veteran of the IT industry for more than 25 years, he is a recognized authority on cybersecurity. If knowledge is power, his deep knowledge informs his strategic vision. This combined experience makes him uniquely qualified to lead efforts to address modern threats such as adversarial AI and deepfake attacks. Haber’s long career has culminated in the publication of four influential books. These works address multiple attack vectors and illuminate the issue of identity security, as well as challenges presented by emerging technologies.

Haber graduated with a Bachelor of Science in Electrical Engineering. He received this Doctorate from the State University of New York at Stony Brook in 1992. His impressive technical expertise has truly shaped his work at BeyondTrust. During his time there, he has held a number of key positions, most notably Chief Security Officer and Vice President of Product Management. We thank him for his almost 12 years of service to the company. Throughout that time, he has played a key role in shaping national security strategies to address changing and emerging cyber threats.

In 2020, Haber accepted an invitation to join the Executive Advisory Board of the Identity Defined Security Alliance (IDSA). This appointment served to deepen his sway over the profession. He is a trusted practitioner and advisor, helping organizations realize the best practices for identity security. This helps make sure they are properly prepared to meet the challenges connected to today’s technology.

The Role of AI in Cybersecurity

Artificial Intelligence (AI) has become the new double-edged sword in cybersecurity. Although AI brings these useful solutions for threat detection and response, it brings new vulnerabilities that adversaries can exploit. Understanding these dynamics is key for organizations that want to protect their digital assets,” Haber tells CSO.

Haber’s expertise lies in defending against adversarial AI attacks, in which bad actors use AI to improve the effectiveness of their attacks on organizations. He points out that the landscape is moving quickly. While organizations invest in AI for defense, attackers have started using this technology to create more advanced threats.

Haber points to perhaps the most surprising yet eye-catching example that’s emerged in recent months – the infamous Hong Kong deepfake CFO scam. In this instance, however, AI-generated impersonations misled corporate decision-makers. These events serve as an important reminder that organizations must consistently and critically consider whether they can trust information found online. Second, they need to adopt robust identity verification and fraud prevention measures.

Strategies Against Emerging Threats

As a scientist, Haber’s role at BeyondTrust is key to developing strategies to combat new threats. These threats encompass, in addition to AI, quantum decryption and other complex technological existential crises. He understands that today’s cybersecurity landscape demands a fundamental change in the way organizations secure what matters most.

So, organizations have to make awareness and education about potential threats a priority. This means championing an environment where staff are encouraged to ask questions when they receive strange requests or emails. As Haber told us, this preventative approach is critical when protecting against scams that use human psychology combined with cutting-edge technology.

Haber’s calls for more robust and holistic identity management solutions that span networks and devices. As he wrote in a 2022 blog post, true security is not about protecting information alone. It includes protecting personal identities, so that only trusted personnel can view sensitive data.

The Importance of Communication and Collaboration

As leaders in a rapidly globalizing world, constant engagement and coordination among the corporate sector is critical. Perhaps most important of all, Haber’s work reminds us that identity security cannot be addressed in a vacuum. It takes the combined efforts of every active stakeholder.

The IDSA’s role to provide industry leadership and critical guidance is essential now. Here, they can learn from peers’ experiences and best practices with each other. By working together, banks, enterprises, and governments can keep ahead of emerging threats and innovations in identity security.

The key point, Haber insists, is that businesses need to get into these communities deeply and consistently. By participating in discussions about emerging trends and sharing experiences, companies can enhance their security posture and remain vigilant against evolving threats.