Eric Haugh
Hingham, Massachusetts, United States
6K followers
500+ connections
View mutual connections with Eric
Eric can introduce you to 10+ people at Britive
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Eric
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Experienced sales leader with a demonstrated history of success across several industry…
Activity
6K followers
-
Eric Haugh reposted thisEric Haugh reposted this📣 The new edition of Identity Security, Simply Put is here! AI continues to stress-test the identity stack, and we’re seeing the cracks in the architecture. This issue unpacks why the era of tool layering is over, and what it actually takes to secure human, agentic AI, and non-human identities under one runtime authorization model. Here's what's inside: 🟣 The Anthropic MCP design flaw the vendor itself calls "expected behavior" — putting 200,000+ AI servers a single config edit away from remote code execution. The real lesson: when the protocol is exploitable by design, the only place left to contain risk is the access boundary. 🟣 SpyCloud's recapture of 18.1 million leaked API keys (6.2 million of which were tied directly to AI tools) — proof that every static token sitting in a vault is a standing liability with a long fuse, not an asset. 🟣 The path forward? Stop vaulting static tokens, start minting dynamic, ephemeral privileges. Zero Standing Privileges #ZSP for human, agentic AI, and machine identities that’s enforced at runtime and revoked the moment the work is done. 🌟 Plus four April Britive blogs (including a deep dive on AWS Security Hub Extended and what native Shared Signals Framework #SSF support unlocks), a recorded webinar on architecting guardrails for agentic AI, and where we'll be IRL between now and #Identiverse2026 Don’t forget to subscribe so the next edition lands directly in your feed 🔔 #AgenticAI #IdentitySecurity #PAM #NHI #AISecurity #CloudSecurity #Britive
-
Eric Haugh reposted thisAttending RSA? If you are a partner in the Identity space I'd love to connect. Britive is delivering PAM for the modern enterprise - Human, Non Human and Agentic - with run time authorization and true ephemeral access. Let's make zero standing privilege is a reality.Eric Haugh reposted thisWill we see you in San Francisco next week? ☀️ The Britive team is heading to RSA to help you architect risk out of existence. We’re moving beyond static rules to runtime identity access enforcement that secures human, agentic AI, and non-human/machine identities through a single, natively unified control plane. Connect with our experts during the event to talk: 🔵 Securing Agentic AI: Managing the full lifecycle and governance of AI agents as first-class identities. 🔵 Unifying Access Security: One common policy model across AWS, multi-cloud, SaaS, and on-prem. for every identity. 🔵 Operational Velocity: Removing the friction of vault-based, deployment-intensive tools with a cloud-native, proxy-less architecture. 🔵 How to achieve Zero Standing Privileges (ZSP): Minting dynamic, ephemeral privileges at the exact moment of execution. 🗓️ Book an individualized strategy session with our leadership team: https://bit.ly/4bN0Dbk Artyom Poghosyan Patrick Welch Nauman Mustafa Garrett Long
-
Eric Haugh reposted thisEric Haugh reposted thisYesterday we shared that Britive was selected as a curated PAM partner in the new AWS Security Hub Extended plan. Here’s why that matters. Security teams are overwhelmed with findings, yet most environments still rely on a “see something, respond later” model. In machine-speed cloud and autonomous AI environments, visibility alone isn’t security. Real security means enforcing access at the moment it happens — not after the fact. That’s what this partnership enables. As Chetan Jha Head of Identity & Vulnerability Management at Marqeta, explains: "As we expand our use of automation, AI, and AWS, managing privileged access across human, service, and agentic identities has become a priority. Britive gives us consistent controls across environments, and the availability of Britive within AWS Security Hub Extended helps align access controls with the rest of our AWS security investments." Through the AWS Security Hub Extended plan, Britive helps organizations move beyond passive detection to runtime identity access enforcement — replacing standing privileges with dynamic, just-in-time ephemeral access. With Britive’s unified platform, organizations can: • Eliminate standing privilege – Replace permanent credentials with Zero Standing Privilege (ZSP) so access exists only when needed. • Secure human and machine identities consistently – Apply the same authorization model to users, AI agents, and non-human identities. • Modernize without architectural drag – Secure workloads without agents, proxies, or legacy PAM complexity. • Streamline through AWS – Deploy and procure Britive through a single AWS-native purchasing and operational experience. This partnership is a major step toward real-time identity security built for cloud and AI environments. We’ve included the press release link in the comments below for those who want to dive deeper.
-
Eric Haugh reposted thisEric Haugh reposted thisWe’re proud to announce that Britive has been selected as a curated PAM partner in the newly launched Amazon Web Services (AWS) Security Hub Extended plan! 🎉 . Modern cloud security must enforce access in real time—not just provide visibility. By integrating Britive Unified PAM with the AWS Security Hub Extended plan, organizations can move from passive detection to runtime identity access enforcement across multi-cloud, hybrid, and AI environments. With Britive’s natively unified platform, organizations can: ✅ Secure Agentic AI – Treat AI identities as first-class actors governed by the same runtime authorization model as human users. ✅ Achieve Zero Standing Privilege (ZSP) – Replace permanent credentials with dynamic, ephemeral permissions granted only at execution time. ✅ Eliminate Fragmented Silos: Replace disparate tools and policies for Cloud, SaaS, Hybrid, and On-Prem with a single common policy and a natively unified identity security control plane. ✅ Scale Security with Cloud and AI Adoption: Support dynamic environments without increasing operational complexity or sacrificing security. ✅ Streamline through AWS: Consolidate Britive’s natively unified PAM into a single-vendor experience with one contract and one bill through the AWS Security Hub Extended plan. Learn more about the AWS Security Hub Extended plan and how curated partner solutions deliver full-stack enterprise security [Link in comments below] 👇 Artyom Poghosyan Sameer Hiremath Patrick Welch Miad M. Nauman Mustafa Garrett Long #AWS #AWSSecurityHub #CloudSecurity #IdentitySecurity #ZeroStandingPrivilege #AgenticAISecurity #Britive
-
Eric Haugh reposted thisEric Haugh reposted thisBritive is now a curated PAM partner in the newly launched Amazon Web Services (AWS) Security Hub Extended plan! Enterprise environments are multi-cloud, hybrid, SaaS-heavy, and are increasingly driven by AI. In this world, visibility is table stakes. You can’t observe your way to security. A unified identity control plane that delivers total visibility, unified control and runtime enforcement is foundational for any modern enterprise security fabric. That’s why we’re a launch partner for the AWS Security Hub Extended plan. The Britive platform delivers: - Unified Visibility & Governance: A natively unified privileged access control plane that provides a single source of truth - Policy-Driven Control: One common policy model to enforce privilege authorization decisions in the runtime for all types of identities - Ephemeral Privileges: Zero Standing Privileges (ZSP) minted at the exact moment of request and automatically revoked - Agentic AI Identity and Access: Extending the same runtime authorization and dynamic privilege controls for human and non-human identities to agentic AI under one unified identity control plane. We’re excited to work with AWS to help enterprises build more integrated and scalable security architecture to meet the innovation demands in the AI era. Learn more about the AWS Security Hub Extended plan below. #AWS #AWSSecurityHub #CloudSecurity #IdentitySecurity #ZeroStandingPrivilege #AgenticAISecurity
-
Eric Haugh posted thisWho's going to FS-ISAC in Orlando next week?
-
Eric Haugh reposted thisEric Haugh reposted thisIn a world of ephemeral cloud infrastructure and autonomous AI agents, the old way of managing privileged access—static roles and permanent vaults—is no longer just "legacy." It’s a liability. We are proud to be recognized by Software Analyst Cyber Research as a key player in the next generation of Privileged Access Management. As the report highlights, the $25B consolidation of legacy players has created a clear divide. On one side: traditional vaulting and session proxies. On the other: the future of Zero Standing Privilege (#ZSP). At Britive, we believe: Standing privilege is a bug, not a feature. If an identity has access it isn’t currently using, that’s a target on your back. Runtime Authorization > Vaulting. Real-time, Just-in-Time (#JIT) ephemeral access is the only way to secure the speed of DevOps and the scale of Non-Human Identities (NHIs). Identity is the new control plane. Security must be invisible to the practitioner but absolute in its enforcement. The analyst community is recognizing what customers already know: the legacy PAM era is ending. The era of ephemeral, intelligent, and cloud-native privilege has arrived. We’re not just filling a gap in the market. We’re building the new standard for identity security. 👇 Read the full analysis by Francis Odum in the comments below. #PAM #AccessManagement #CloudSecurity #AISecurity #IdentitySecurity
-
Eric Haugh shared thisIf you're attending InfoSec World in Orlando next week, stop by booth #817 to connect and learn more about Britive. Britive is a modern Cloud PAM platform that delivers just-in-time access and Zero Standing Privileges for human, non-human, and Agentic AI identities across Cloud, SaaS, and On-Prem environments. If you’ll be there, come say hi — I’d love to chat about how leading enterprises are modernizing privileged access!
-
Eric Haugh reposted thisEric Haugh reposted thisWill we see you at InfoSec World next week? 👀 Identity is the control plane, and it’s moving fast. Britive's showing how modern teams are securing humans, service accounts, and AI agents with runtime authorization and Zero Standing Privileges. 🍽️ Don’t miss our Power Lunch Session on Mon, Oct 28 @ 12:15 PM, featuring Chetan Jha, Marqeta’s Head of Identity in conversation with Britive's Field CTO, Ketan Kapadia. During the presentation, we’ll unpack how IAM programs are evolving for multi-cloud, ephemeral access, and agentic automation. Swing by Booth 817 to see Britive’s cloud-native PAM in action with ephemeral access, real-time policy enforcement, and unified guardrails for every identity type. Want a deeper dive? Book a demo or ask for a feature walkthrough so we can hit everything you’re curious about: https://hubs.ly/Q03PwkNg0 See you there! 👋 #Britive #InfosecWorld #IdentitySecurity #PAM #ZeroStandingPrivileges #JustInTimeAccess #AgenticAI #CloudSecurity
-
Eric Haugh liked thisEric Haugh liked this🎯 Heading to the Gartner Security & Risk Management Summit 2026? Join Britive at Booth #1139 to see what next-gen identity security looks like in practice. Britive secures human, agentic AI, and non-human identities through a single unified control plane. One policy model. One platform. Zero standing privileges, by architecture. At the booth, our team will walk you through: ✅ Privilege creation at runtime, minted ephemerally at the moment it's needed and gone the moment the task is done ✅ Continuous authorization with the ability to revoke any session, mid-flight, the moment context changes ✅ One policy model across AWS, Azure, GCP, OCI, SaaS, hybrid, and on-prem, without the need for custom integrations across each environment ✅ AI agent security, including MCP server and gateawys for governing autonomous agent access. If you're rethinking how to secure access at machine speed without slowing engineers down, we should chat 💬 📅 June 1–3, 2026 📍 Booth #1139 💡 Stop by for a chance to chat with the team or engage in one of booth activities! Want a dedicated time slot? Schedule a meeting in advance to dive deeper into your security priorities. ⬇️ #GartnerSecurity #IdentitySecurity #CloudPAM #ZeroStandingPrivileges #ZSP #RiskManagement #CybersecurityLeadership #NonHumanIdentities #ZeroTrust #CyberSecurityEvents #GartnerSummit2025 #IAM #PAM #AIIdentitySecurity
-
Eric Haugh liked thisEric Haugh liked thisMost identity programs treat identity like a noun. So progress looks like, let’s add more attributes and categories to mature our taxonomy to show progress and how thoughtful and nuanced our identity programs is. But nothing actually changes, because identity isn’t a noun. It’s a verb. It’s what an identity can do, how it’s verified, and how the system responds in real time (think mfa, step up, allow, deny) If your labels don’t drive different behavior “Privileged.” “Contractor.” “High risk.” If they all behave the same, those labels mean nothing. That gap between what you’ve defined and what you actually enforce is called Taxonomic Debt. My advise, don’t get caught up in the hype, IAM is one of best fields to apply the first principle thinking. I break this down in the latest episode of The Identity Navigator. #TheIdentityNavigator
-
Eric Haugh liked thisEric Haugh liked thisBefore the weekend starts, let's talk PAM maturity. Modern times create modern problems, and AI is now operating inside privileged environments. Most PAM tools weren't built for that. Some vendors bolted on a fix, while Britive was built from the ground up with this exact problem in mind. The difference matters. The infographic below is how I believe any PAM tool can be simplified, and where your tools should be capable of getting you. Most teams stop at stage one or two and call it done. The ones that reach stage five are the ones that stop breaches before they start. Where does your organization fall? #ZeroStandingPrivileges #ZSP #CloudSecurity #PAM #ZeroTrust #CyberSecurity #Britive
-
Eric Haugh liked thisEric Haugh liked thisAs always eternally grateful for my amazing network on here and all of the love and kind words It’s hard to believe it’s been 3 years, but our family couldnt be any stronger with the help of all of you Looking forward to seeing everybody next Month to celebrate Jill on Saturday 6/27! #JillyStrong 5.4.2023 Jill Button
-
Eric Haugh liked thisEric Haugh liked thisChapter Update: Last week marked my final day with Cigna Healthcare. Though my time there was brief, it was an incredibly rewarding experience. I’m proud of what we achieved, including establishing AI security capabilities framework,developing MCP server security guidelines, and completing over 10 complex AI security architecture reviews. A huge thank you to Kristen Garrison and David Prefer and other talented and collaborative colleagues —your support was instrumental in helping me make a meaningful impact. Today, I’m thrilled to share that I’ve started a new role as Security Engineering Manager at Ares Management. I’m eager to build out the team and develop our AI security program from the ground up. Grateful to Elliot Proebstel, Alyson Krause, Mike Murray and Jared Nussbaum for welcoming me to the team! (By the way, the snacks here are top-tier) Looking forward to the great journey ahead! #CyberSecurity #AISecurity #Leadership #AresManagement #NewChapter
-
Eric Haugh liked thisEric Haugh liked thisThinking you’ll secure your AI agents like service accounts? 😬🙅♀️ As organizations navigate the agentic AI conversation, applying static access models to autonomous systems creates a massive, invisible attack surface. Service accounts operate on predictable, scripted behavior. AI agents operate on intent, generating their own, potentially unexpected execution paths across your cloud environments and SaaS platforms. Properly securing human, agentic AI, and non-human identities at scale means: 🔵 Solving both the authorization AND authentication problems (not just one or the other). 🔵 Establishing an agent registry for complete lifecycle visibility and contextual human-in-the-loop approvals. 🔵 Turning #ZSP into operational reality via dynamic, ephemeral privileges created and enforced in real time. Stop relying on the "observe first, secure second" model. Architect security directly into your identity and access processes. 📖 Read the full post: https://bit.ly/41liyjm #AISecurity #CloudSecurity #Cybersecurity #AgenticAI
-
Eric Haugh liked thisEric Haugh liked thisOh man, this past Monday.. 🏃♂️➡️ 26.2 miles of gratitude, tears, and love. It takes a village. Thank you to everyone who cheered, believed, and pushed me forward. Running for #MilesforMiracles - Boston Children's Hospital reminded me every mile of WHY we run. Every child deserves a chance to experience their own miracle. Thank you to all who supported this cause - your kindness made a real difference ❤️ #BostonMarathon #Boston2026 #BAA #RunForACause Upwind Security #newbalance #UpwindSecurity
Experience
Education
Honors & Awards
-
2019 President's Club
Thought Industries
-
2018 Sales and Marketing MVP
Thought Industries
Languages
-
English
Native or bilingual proficiency
Recommendations received
2 people have recommended Eric
Join now to viewView Eric’s full profile
-
See who you know in common
-
Get introduced
-
Contact Eric directly
Other similar profiles
Explore more posts
-
Tyrin Ford
Palo Alto Networks • 16K followers
A security incident involving the Salesloft Drift integration with Salesforce is the subject of Unit 42's latest Threat Brief. Researchers include observations as well as recommendations: #PaloAltoNetworks #GoPaloAltoNetworks #PAN #PANW #Cybersecurity #Cyberthreats #Unit42 #Salesloft #Drift #Salesforce #SalesloftDrift
6
1 Comment -
Aaron Bird
Inflection.io • 10K followers
When agents can talk directly to your apps through an MCP server, everything changes. Instead of a human jumping between Salesforce, Airtable, etc... an agent can do it autonomously: Summarize call transcripts for target accounts from Gong Pass those summaries to Inflection to create custom segments Draft a target account campaign based on these custom segments No brittle integrations. No copy-paste workflows. No “please log in and click this button.” The agent just acts — safely, deterministically, and across systems via multiple MCP servers.
16
-
Tiago Andrade
NetApp • 7K followers
Cyberattacks are up 37% and HALF now result in breaches. So what’s changing, and how can you stay ahead? NetApp SVP & GM Gagan Gulati sat down with cybersecurity expert Shira Rubinoff to talk through: - Why cyber resilience is now a boardroom priority - How ransomware is evolving and targeting data itself - The double-edged sword of AI in cybersecurity - Why clean, trusted data is your best defense Where others stop at detection, NetApp goes beyond detection, building resilience into your data itself. Get ahead of the threat. Watch the conversation: https://bit.ly/3XONpTJ
6
-
Rob Sullivan
Sweep • 4K followers
Cybersecurity companies know observability reduces risk. When applied to Salesforce architecture, the results are measurable: 🪄 85% faster system audits 🪄 100% change coverage in audit-ready history 🪄 An avg. $500K+ annual TCO savings Companies like Wiz and SailPoint are applying security-grade governance to their internal systems — using Sweep’s agentic layer to continuously contextualize metadata across environments. Because compliance and control shouldn’t stop at the edge of your product. For more 👉 https://lnkd.in/epCMiv97
11
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content