Hi [[ session.user.profile.firstName ]]

Privileged Access Management Fundamentals: Secure Your Success

In times of crisis, the success of your business depends considerably on operational resilience. So, it is not surprising that cyber security - a key component of such resilience - comes under the spotlight.
Privileged access represents one of the largest security vulnerabilities you may face today and could certainly become that weak link that cyber attackers are after. Ultimately, most high-profile security breaches start with a stolen privileged credential.
This webinar will show you how to improve your operational resilience and cyber security posture by focusing where it matters most – securing privileged access. Our presenters will discuss how privileged access can be secured in a convenient, as-as-service way that matches today’s digital reality and business environment.
Why is privileged access so important? Why are attackers inside and outside the enterprise zeroing in on privileged accounts? What can you do to protect your organization?
These and other important privileged access management questions will be answered during our live webinar featuring CyberArk’s security experts:
• Nir Gertner, Chief Security Strategist @CyberArk
• Noam Liran, Director of Customer Success @CyberArk

You will learn:
• What privileged access is – where it exists across the organization and why it is under attack;
• The anatomy of most common attacks on privileged access – existing and evolving attack vectors, privilege escalation, lateral and vertical movement;
• Top Privileged Access Management use cases;
• How to get started with a PAM program – key steps and best practices
• How to deploy a PAM system in a remote environment
Live online Jul 14 6:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nir Gertner, Chief Security Strategist and Noam Liran, Director of Customer Success
Presentation preview: Privileged Access Management Fundamentals: Secure Your Success

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Privileged Access Management as a Service: Why You Need it Now More Than Ever Jul 29 2020 6:00 pm UTC 60 mins
    CyberArk
    New to Privileged Access Management (PAM)? If so, you may want to hit the “skip” button on all the catchphrases, lingo, acronyms, and buzzwords that can make learning cyber security (and specifically PAM) more complicated than it needs to be. Sometimes concepts are best learned in simple terms and basic language.

    You are invited to attend this webinar to jumpstart your understanding of privileged access management, how to run it “as a service”, and many other concepts to help you accelerate your cyber security efforts for your company.

    You will also receive a free eBook “Privileged Access Management as a Service for Dummies” after attending the webinar which will help you explore these topics in more depth.

    The webinar will cover the following topics in a conversational setting:
    • Defining “Privilege Access Management (PAM)” and “PAM as a Service”
    • Understanding the risks of privileged access
    • How privileged access can be secured via people, process, and technology
    • How to secure privileged access for:
    o On-premises assets
    o Cloud and dynamic applications
    • How to get started with PAM as a Service
    • Six action items you should investigate right now (things you can immediately take away from the webinar)

    Presenters:
    Aaron Pritz, CEO and Co-Founder of Reveal Risk (a boutique cyber security, data privacy and risk management consultancy).
    Aaron is an experienced cross-functional Information Security leader with a diverse background encompassing process improvement, the management of complex IT projects, innovative strategy development, audit/compliance programs.

    Brandon Traffanstedt, Global Director of Systems Engineering for CyberArk
    Brandon serves as a technical advisor and subject matter expert on privileged access and securing emergent technologies. With over 10 years in the combined spaces of information security, development, and systems engineering, Brandon has architected security solutions for some of CyberArk's largest global customers
  • Privileged Access Management Fundamentals: Secure Your Success Jul 14 2020 6:00 pm UTC 60 mins
    Nir Gertner, Chief Security Strategist and Noam Liran, Director of Customer Success
    In times of crisis, the success of your business depends considerably on operational resilience. So, it is not surprising that cyber security - a key component of such resilience - comes under the spotlight.
    Privileged access represents one of the largest security vulnerabilities you may face today and could certainly become that weak link that cyber attackers are after. Ultimately, most high-profile security breaches start with a stolen privileged credential.
    This webinar will show you how to improve your operational resilience and cyber security posture by focusing where it matters most – securing privileged access. Our presenters will discuss how privileged access can be secured in a convenient, as-as-service way that matches today’s digital reality and business environment.
    Why is privileged access so important? Why are attackers inside and outside the enterprise zeroing in on privileged accounts? What can you do to protect your organization?
    These and other important privileged access management questions will be answered during our live webinar featuring CyberArk’s security experts:
    • Nir Gertner, Chief Security Strategist @CyberArk
    • Noam Liran, Director of Customer Success @CyberArk

    You will learn:
    • What privileged access is – where it exists across the organization and why it is under attack;
    • The anatomy of most common attacks on privileged access – existing and evolving attack vectors, privilege escalation, lateral and vertical movement;
    • Top Privileged Access Management use cases;
    • How to get started with a PAM program – key steps and best practices
    • How to deploy a PAM system in a remote environment
  • Best Practices that Protect Workstations From Attacks Jul 13 2020 4:00 pm UTC 60 mins
    CyberArk
    Workstation targeted attacks revolve around privilege, whether they are Windows-based or MacOS. As attackers aim for a foothold in your organization, they look to steal credentials, manipulate applications, and move laterally across the network.

    In this session, we will focus on best practices for protecting your organization from these advanced attacks and showcase practical ways to implement the principal of least privilege across all of your Windows and Mac workstations.
  • Securing DevOps 101: Shift Left with Security into the Development WorkFlows Recorded: Jul 8 2020 16 mins
    Jed Knopf, Solutions Engineer
    While DevOps enables organizations to more rapidly meet customer needs, it also presents new challenges for organizations, and especially for the security team. Too often security teams can struggle to engage with developers and get developers to appropriately prioritize security. Yet, security teams that “Shift Left” and get engaged with developers early in the development workflows are finding success.

    Watch this webinar to learn how security teams can engage earlier in the development process – getting developer buy-in and freeing developers from the burden of addressing security.

    The practical guidance shared in this session will help you be better prepared to take on the challenge of securing your organizations DevOps environments – whether you are new to DevOps or are already securing DevOps environments.

    Learn how to answer the following questions:

    •How do I engage with developers and DevOps teams?
    •How does security “shift left” and get engaged earlier in the development workflows?
    •What security challenges exist in DevOps environments?
    •What practical steps can I take to address these security challenges?
  • Simplifying Security for OpenShift and Ansible Environments with CyberArk Recorded: Jun 24 2020 60 mins
    Cyber & Red Hat
    Simplify the security of OpenShift and Ansible environments while also enhancing your organization’s security posture by leveraging CyberArk’s out-of-the-box certified integrations with Red Hat. In this session you’ll learn how to leverage and adopt security industry best practices while avoiding impacting developer velocity.

    This session will provide:

    A clear understanding of the requirements for securing the credentials and secrets used by applications, containers, DevOps tools and automation scripts
    The benefits of supplementing the native secrets management and security capabilities of OpenShift and Ansible with the certified integrations of the CyberArk platform
    Why and how to secure credentials for both human users and non-human identities
    How to get started with Open Source and next steps
  • A Service You Can Trust Recorded: Jun 19 2020 18 mins
    Barak Feldman, VP Emerging Technologies
    A successful PAM program goes beyond just implementing a good product — it takes strategic planning across people, process and technology. And we’re here to help. In this session, you’ll learn about selecting a PAM solution that provides security, availability and privacy
  • Ask CyberArk Podcast: Episode 1 with CEO, Udi Mokady Recorded: Jun 18 2020 22 mins
    Jeffrey Kok, VP, Solutions Engineering, Asia Pacific & Japan Udi Mokady, CEO, Co-Founder and Chairman
    We’re excited to reveal CyberArk's first ever video podcast. Episode #1 features CEO, Udi Mokady - discussing the new normal, and our recent acquisition of IDaptive – along with navigating the latest integrations/plugins in the CyberArk Marketplace. To hear more about our solutions and how we secure your business while maximizing your investment, join us virtually at Impact Live 2020 on July 21-22. Register here! https://www.cyberark.com/impact-live-2020/

    iDaptive Website
    https://www.idaptive.com/

    MFA/SSO Free Trial till Oct'2020
    https://www.idaptive.com/free-trial

    CyberArk Marketplace For Integrations/plugins With Technology Partners
    https://marketplace.cyberark.com/

    PAS Reporter for Report Generation to Vault and EVD
    https://cyberark-customers.force.com/mplace/s/#a352J000000pg09QAA-a392J000001h4PKQAY

    Plugin Generator Utility (PGU) for CPM-SSH and PSM-Web
    https://cyberark-customers.force.com/mplace/s/#a3550000000EiC4AAK-a3950000000jjUeAAI
  • Securing the Cloud in 2020: Threats, Visibility & Privileged Access Recorded: Jun 17 2020 58 mins
    Diana Kelley, Andy Givens, Manav Khanna & Tim Bach
    Cloud security remains a challenge for enterprises, especially in the new post-COVID-19 reality of 2020 and the shift to remote working. What are the new threats on the horizon and compliance considerations to keep in mind?

    Join this interactive panel of cloud security experts and industry leaders to learn more about:
    - New and old cloud security threats to keep in mind
    - Why visibility is key for cloud security
    - Know your cloud: Who is accessing what and when? How was their identity verified?
    - Privileged identities and what's needed for secure privileged access
    - Compliance challenges and considerations
    - Best practices for securing your data in the cloud

    Speakers:
    Diana Kelley, Cybersecurity Field CTO, Microsoft
    Andy Givens, VP Solutions Engineers, North America, CyberArk
    Manav Khanna, Senior Director of Product Management Identity & Access Management, Thales
    Tim Bach, Vice President of Engineering, AppOmni
  • Parting the Cloud : Securing Privileged Identities in Modern Environments Recorded: Jun 17 2020 34 mins
    Brandon Traffanstedt, Global Director, Systems Engineering
    As organizations rapidly move human and machine access and workloads to the Cloud, scale and efficiency are at an all time high. With this exponential increase of scale, attackers are taking advantage of the lack of visibility and over-permissioning that tends to occur as a result of the, often rapid, transformation.

    In this session we’ll discuss tactics to discover and remediate privilege faux paus for the people and robots that need powerful access into your Cloud infrastructure.
  • Securing DevOps 101: Shift Left with Security into the Development WorkFlows Recorded: Jun 17 2020 17 mins
    Jed Knopf, Solutions Engineer
    While DevOps enables organizations to more rapidly meet customer needs, it also presents new challenges for organizations, and especially for the security team. Too often security teams can struggle to engage with developers and get developers to appropriately prioritize security. Yet, security teams that “Shift Left” and get engaged with developers early in the development workflows are finding success.

    Watch this webinar to learn how security teams can engage earlier in the development process – getting developer buy-in and freeing developers from the burden of addressing security.

    The practical guidance shared in this session will help you be better prepared to take on the challenge of securing your organizations DevOps environments – whether you are new to DevOps or are already securing DevOps environments.

    Learn how to answer the following questions:

    •How do I engage with developers and DevOps teams?
    •How does security “shift left” and get engaged earlier in the development workflows?
    •What security challenges exist in DevOps environments?
    •What practical steps can I take to address these security challenges?
  • Least Privilege in a Cloud-First World Recorded: Jun 16 2020 37 mins
    Andy Givens, VP Solutions Engineers, North America
    The cloud makes a lot of things easier. Unfortunately, over-permissioning users is one of those things. In this session we’ll discuss: tactics to discovering and remediating privilege faux paus in your cloud infrastructure.
  • Secure Non-Human Access Recorded: Jun 12 2020 16 mins
    Chris Cochrane, Director Solutions Engineering
    We’ll cover how to secure applications by removing hard-coded credentials and replacing them with dynamic and secure credentials and secrets.
  • Secure Human Access Recorded: Jun 5 2020 16 mins
    Matt Tarr, Principal Solutions Engineer
    We’ll cover how to secure applications by removing hard-coded credentials and replacing them with dynamic and secure credentials and secrets.

    -How do your users currently access?
    -Enable secure, native access
    -Isolate credentials and sessions
    -Security & operations wins
  • Get Started with PAM Recorded: May 29 2020 18 mins
    Noam Liram, Director of Customer Success
    We’ll outline the steps every organization should take as they embark on their PAM journey.

    -What to Prioritize
    -what is "Good Enough"
    -Beyond Spreadsheets (getting started)
  • Simplifying Security for OpenShift and Ansible Environments with CyberArk Recorded: May 28 2020 61 mins
    Cyber & Red Hat
    Simplify the security of OpenShift and Ansible environments while also enhancing your organization’s security posture by leveraging CyberArk’s out-of-the-box certified integrations with Red Hat. In this session you’ll learn how to leverage and adopt security industry best practices while avoiding impacting developer velocity.

    This session will provide:

    A clear understanding of the requirements for securing the credentials and secrets used by applications, containers, DevOps tools and automation scripts
    The benefits of supplementing the native secrets management and security capabilities of OpenShift and Ansible with the certified integrations of the CyberArk platform
    Why and how to secure credentials for both human users and non-human identities
    How to get started with Open Source and next steps
  • What is PAM? Why Prioritize PAM as a Service? Recorded: May 22 2020 20 mins
    Barak Feldman, VP Emerging Technologies at CyberArk
    We’ll discuss the different types of privileged accounts, where they exist and why prioritizing PAM is so important.
  • Discover and Secure your Dynamic Attack Surface Recorded: May 14 2020 44 mins
    CyberArk and Rapid7
    Today organizations have dynamic security problems to solve, and they increasingly rely on trusted partners for optimal solutions. Rapid7 and CyberArk offer integrations to provide the awareness, assessment and actions that you need to keep your organization secure.

    With a massive migration to “work from home” and critical servers and appliances being configured for remote management, the attack surface is growing and changing at an extraordinary pace. Having solutions that not only provide security, but do so without draining resources, is critical.

    In this webinar, we will cover how to:

    Use attack surface monitoring with Project Sonar in InsightVM to identify assets connected to the public internet
    Continuously assess your environment to discover potentially unmanaged endpoints and systems and automatically add them to be managed within CyberArk
    Ensure complete, accurate and secure vulnerability assessment scans are performed
    Take automated or manual actions to address potential risks

    Panelists:
    Justin Buchanan, Sr. Product Marketing Manager, InsightVM at Rapid7
    Joe Strickland, Principal Solutions Engineer at CyberArk
    Andrew Silberman, Sr. Product Marketing Manager at CyberArk
  • Why You Should Be Using Privileged Access Management as a Service Recorded: May 13 2020 26 mins
    CyberArk
    While Privileged Access Management (PAM) as a Service is not a brand-new concept, it could be critical for those organizations that simply don’t have the resources to deploy and maintain an on-premise PAM solution. PAM as a Service is a way to outsource complex security solutions needs to experts in the field while allowing internal IT and security teams to focus on core business competencies.

    View this SC Magazine webcast on-demand to understand what PAM as a Service can do for you
  • Developing a Privileged Access Security Information Hub Recorded: May 4 2020 44 mins
    James Creamer, Lead Strategist, CyberArk PAS Program Office
    Webinar shows how organizations can use the CyberArk REST API to improve their onboarding efficiency, data accuracy and security posture. Summarizes the recommended approaches to building automated credential onboarding and lifecycle management. Includes real life examples with workflows and demos. Outlines resources which can help organization’s start their automation journey.

    Covers major updates since V10, highlights key capabilities including creating and deleting safes, adding and updating credentials, adding service dependencies and provisioning access. Wraps up with a technical Q&A.
  • Intro to Core PAS for Government Recorded: May 1 2020 19 mins
    Kevin Jermyn, Federal Customer Success Manager
    CyberArk the #1 leader in Privileged Access Management has been assisting Federal agencies meet their PAM initiatives. In this three-part series, we will further assist with those efforts by demonstrating some common network takeover techniques used by attackers in recent breaches that exploit privileges.
CyberArk the leader in Privilege Access Management
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Privileged Access Management Fundamentals: Secure Your Success
  • Live at: Jul 14 2020 6:00 pm
  • Presented by: Nir Gertner, Chief Security Strategist and Noam Liran, Director of Customer Success
  • From:
Your email has been sent.
or close