Hi [[ session.user.profile.firstName ]]

Privileged Access Management Fundamentals: Secure Your Success

In times of crisis, the success of your business depends considerably on operational resilience. So, it is not surprising that cyber security - a key component of such resilience - comes under the spotlight.
Privileged access represents one of the largest security vulnerabilities you may face today and could certainly become that weak link that cyber attackers are after. Ultimately, most high-profile security breaches start with a stolen privileged credential.
This webinar will show you how to improve your operational resilience and cyber security posture by focusing where it matters most – securing privileged access. Our presenters will discuss how privileged access can be secured in a convenient, as-as-service way that matches today’s digital reality and business environment.
Why is privileged access so important? Why are attackers inside and outside the enterprise zeroing in on privileged accounts? What can you do to protect your organization?
These and other important privileged access management questions will be answered during our live webinar featuring CyberArk’s security experts:
• Nir Gertner, Chief Security Strategist @CyberArk
• Noam Liran, Director of Customer Success @CyberArk

You will learn:
• What privileged access is – where it exists across the organization and why it is under attack;
• The anatomy of most common attacks on privileged access – existing and evolving attack vectors, privilege escalation, lateral and vertical movement;
• Top Privileged Access Management use cases;
• How to get started with a PAM program – key steps and best practices
• How to deploy a PAM system in a remote environment
Recorded Jul 14 2020 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nir Gertner, Chief Security Strategist and Noam Liran, Director of Customer Success
Presentation preview: Privileged Access Management Fundamentals: Secure Your Success

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Proactive Prevention Starts By Assuming-Breach Recorded: May 11 2021 48 mins
    Brandon Traffanstedt, Sr. Director at CyberArk
    Proactive Prevention Starts By Assuming-Breach: Securing Powerful Access From Dynamic Threats

    Today’s cyber security strategy must secure access at all layers of the environment: from remote endpoints and devices to core databases and servers deep in the datacenter – whether located on prem, in the cloud, or both.

    Dynamic, increasingly complex environments present rich hunting grounds for bad actors and cyber criminals. Coupled with the proliferation of systems accessed by automated, machine-to-machine applications, bots, and cloud-based components like containers – the concern is immediate.

    From new types of ransomware to advanced supply chain attacks – as cyberattacks become ever-more sophisticated, how do you secure your organization?

    Join this session to start thinking like an attacker as we review how to adopt an “Assume-Breach” mindset to prevent attackers from circumventing access controls to penetrate and propagate within your environments. Through a Defense-in-Depth approach to security, Brandon Traffanstedt, Sr. Director at CyberArk, will explore how you can implement policies and controls that detect and isolate adversaries before they traverse your network and inflict serious damage.
  • Preventing the Big One: Staying Ahead of the Breach Recorded: May 11 2021 54 mins
    Michelle Drolet, Towerwall| Andy Thompson, CyberArk| Nico Fischbach, Forcepoint| Satya Gupta, Virsec| Micheal Meyer, MRSBPO
    Over 37 billion records were exposed in breach events in 2020 - by far the most records exposed in a single year, according to a recent report by Risk Based Security. How has remote working impacted your organization's security posture? What lessons can security professionals learn from the recent wave of breaches and what steps can enterprises take to strengthen security in 2021?

    This keynote panel of security experts and industry leaders will explore the best practices for breach prevention, as well as share real-life lessons from the frontlines on what works and doesn't work.

    Viewers will learn more about:
    - The reality of data breaches
    - Why data breach severity is rising
    - Ransomware attacks on the rise (doubling from 2019 to 2020) and the threat to businesses
    - Technologies that help with breach prevention, detection and response
    - Why security awareness matters and best practices for educating employees to be cyber secure

    Moderated by:
    Michelle Drolet, CEO, Towerwall
    Nico Fischbach, Global CTO, Forcepoint
    Micheal Meyer, Chief Risk and Innovation Officer, MRSBPO
    Andy Thompson, Research Evangelist, CyberArk
    Satya Gupta, CTO & Founder, Virsec
  • The Future of Access Management Recorded: Apr 27 2021 46 mins
    Stas Neyman, Director of Product Marketing and Khizar Sultan, Sr Director of Access Solution Strategy
    Access management is an essential component of the Zero Trust security model and a central pillar of the enterprise technology portfolio. CIOs and CISOs use Access Management solutions to protect companies from security breaches, while business leaders leverage AM technologies to enhance productivity, improve operational efficiency, and enable new business initiatives. However, as IT and business environments change, Access Management capabilities must evolve to address the new challenges and threats.

    Join us to learn about the emerging trends in the Access Management space, see how AM can secure hybrid IT environments, and get a sneak peek at the next generation of CyberArk’s AM capabilities.

    After attending the webinar, you will be able to:

    -Understand how changes in IT environments and business drivers are shaping Access Management space
    -Determine which security-focused capabilities are becoming increasingly important
    -Evaluate CyberArk Identity against legacy and modern IAM solutions
    -Gain insight into the next generation of CyberArk’s Access Management capabilities
  • State of Cloud Security: How do we get to Consistent Least Privilege? Recorded: Mar 18 2021 38 mins
    Brandon Traffanstedt, Identity Security Solutions Strategy & Chris Maroun, Identity Security Solutions Strategy
    IAM is a foundational cloud security control. For years, AWS, Azure and GCP have stressed that
    least privilege access for all human and machine identities is a security best practice.

    Yet as Cloud Providers introduce new features and companies adopt more than one Cloud Provider, proper oversight of access to critical infrastructure and workloads grows more challenging. Recent breaches have made it clear even world-class security organizations can struggle with least privilege.

    So what do organizations need to know as they look to address the visibility and configuration
    challenges of traditional cloud IAM tools?

    Join Brandon Traffanstedt and Chris Maroun, Senior Directors from CyberArk’s Global Technology Office, as they explore the state of cloud security and discuss:

    • Lessons from recent breaches involving excessive permissions
    • Identifying and mapping risky, misconfigured and unused entitlements for all cloud entities
    • Right-sizing IAM policies to defend against external and insider threats
    • When to stick with cloud native IAM and when to turn to third party tools
    • Structuring a holistic, multi-level security plan that includes implementing and maintaining
    least privilege
  • The Anatomy of the SolarWinds Attack Recorded: Mar 18 2021 44 mins
    Lavi Lazarovitz, Director of Cyber Research, CyberArk Labs & Andy Thompson, Research Evangelist, CyberArk Lab
    In early December 2020, a supply chain attack was discovered which “trojanized” SolarWinds Orion business software updates in order to distribute malware. The campaign successfully infected 18,000 organizations – including a number of government agencies and high-value companies around the world.

    Attacks of this magnitude and sophistication have a vast and rippling impact. Whether you have been directly affected or not – we are witnessing a new level of attack sophistication that demands a closer understanding.

    Learn from the team that discovered the Golden SAML attack vector back in 2017 – an innovative technique now seen used for the first time in the SolarWinds attack. What we’ll cover:
    • The rise of the digital supply chain attack
    • An attacker’s perspective on Orion
    • An end-to-end review of the attack flow
    • How the attackers managed to trojanize SolarWinds code
    • What the attackers did during months of seeming inactivity
    • A review of the Golden SAML technique
    • The big picture – what ‘Solorigate’ means for attackers and defenders.
  • [Panel] Securing a MultiCloud Environment Recorded: Mar 15 2021 60 mins
    Jo Peterson, Ed Featherston, Nissim Pariente, Stan Lowe and Brandon Traffanstedt
    According to the Flexera 2020 State of the Cloud Report, 93 percent of enterprises have a multi-cloud strategy.

    In this session we’ll explore some of the critical challenges that a multi cloud environment can present around security such as access, hypercomplexity and reduced visibility.

    We’ll review options around:
    - Cloud Security Frameworks
    - Multi-Cloud Security Best Practices
    - Specific Tips to Strengthen Cloud Security Configurations
  • Federal Agencies: A Risk Based Approach to Insider Threat Detection Recorded: Mar 9 2021 41 mins
    Kevin Jermyn, Federal Customer Success Manager
    Malicious insiders have been and continue to be a major threat to the United States government. Regardless of motivation, when an insider decides to go rogue they can cause severe damage to an agency and, in some cases, even adversely impact the state of national security.

    We highlight how:
    •U.S. Federal Government agencies can put in place effective countermeasures to combat insider threats
    •Provide granular level access to critical systems and applications
    •Effectively manage and monitor all privileged access activity through CaC authentication and PKI compliance
  • Innovation in Government: Fighting Cyber Threats with Identity Management Recorded: Mar 3 2021 52 mins
    Government Cyber Leaders
    At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.
  • Zero Trust: Identity Security Recorded: Feb 23 2021 41 mins
    Kevin Jermyn, Federal, Customer Success Manager
    Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies.

    Learn how CyberArk fits into a Zero Trust architecture and allows for significant risk reduction and security for both human and non-person entities (RPA, DevSecOps, etc). Leverage privilege identities remotely in a secure, VPN-less, user friendly workflow to ensure security no matter where access is needed from.
  • Protecting the enterprise with secure, automated processes Recorded: Feb 17 2021 37 mins
    Joe Garcia, DevOps Security Engineer, CyberArk
    We all recognize automation can drive dramatic improvements in operational efficiency, but as recent attacks in the software supply chain highlight – automated processes also need to be secure.

    This session provides tips to improve the security of automation processes running on Red Hat® Ansible® Automation Platform. Gain a better understanding of how open source and enterprise security tools address:

    - How CyberArk’s secrets manager secures credentials used by Red Hat Ansible, including examples with Ansible collections, to automatically onboard secrets as they are created.

    - Using Red Hat® Ansible® Tower’s built-in CyberArk secret lookups to remove SSH private keys and root account passwords out of Tower Credentials and Red Hat Ansible playbooks. Learn how to use a “just-in-time” (JIT) approach to give Playbooks access to credentials.

    You’ll leave this webinar with the tools you need to start strengthening the security of your organization's Red Hat Ansible Automation processes and playbooks.

    Joe Garcia is a DevOps Security Engineer at CyberArk. He is currently focused on helping customers implement and scale effective secrets management solutions. As CyberArk's subject-matter expert in automation, Joe Garcia shares CyberArk's vision of building a security community that is as agile as the automation they are securing in today's fast-paced environments.

    This webinar is co-hosted in partnership with CyberArk and Red Hat. As a result, both Red Hat and CyberArk are collecting your personal data when you submit such information as part of the registration process above. For more information on each party’s privacy practices, please see:
    Red Hat's Privacy Statement: www.redhat.com/en/about/privacy-policy
    CyberArk's privacy statement: www.cyberark.com/privacy-policy
  • Cloud Security Must: Ensuring Least Privilege Recorded: Dec 17 2020 30 mins
    Josh Kirkwood, Solutions Engineering Manager, CyberArk
    The principle of least privilege access – in which all human and machine identities should have only the permissions essential to perform their intended function – is a cloud security best practice promoted by cloud providers like Azure, GCP and leading industry frameworks like MITRE ATT&CK and Cloud Security Alliance’s Cloud Controls Matrix. In this webinar, attendees will learn about the risks of overly broad permissions and how to address them.

    What you’ll walk away with:

    - Discover the role of excessive permissions in data breaches
    - Learn best practices for identifying and remediating excessive permissions in cloud environments
    - Explore free and open source tools to gain visibility across multiple cloud environments
    - Develop a plan to continuously verify least privilege and meet regulatory + Industry compliance objectives
  • Top Attack Paths in the Cloud Recorded: Dec 8 2020 45 mins
    Brandon Traffanstedt, Global Solutions Engineer Director
    Security pros detail the common ways bad actors attack your cloud environments
    As organizations just like yours transition to cloud environments, so do the cyber criminals. An inherent lack of visibility across cloud environments and workloads is masking security threats, undermining compliance and governance and compromising the value of cloud adoption. Individual cloud vendors, point security solutions and siloed teams address just one piece of the puzzle, increasing the risk of misconfigurations and inhibiting the ability to prioritize the most serious threats.

    It can be overwhelming for security teams when organizations rush headfirst into the cloud without consulting them, putting data and processes at risk.

    To effectively mitigate risk, you need to know what bad actors are after. This webinar will guide you through the main compromise points and attacks paths in the cloud.

    You will understand:
    •How attack paths in the cloud are different from the ones typical for on-premises infrastructure and resources
    •The danger of privileged credentials compromise in the cloud
    •Understand 3 to 4 of the most common Cloud attack paths and potential mitigation tactics and tools
    •The role of cloud identities and permissions in the overall cloud security posture

    Join this webinar and learn how to combat bad actors in the cloud. Bring your questions and concern, we will have a live Q&A session with the CyberArk security pro!
  • Uncovering the True Impact of Digital Transformation Recorded: Dec 2 2020 29 mins
    CyberArk
    In today’s mostly digital world, the increased number and sophistication of cyber attacks amplifies the need for consistent security controls across the IT infrastructure, cloud environments, RPA, DevOps and any digital initiative on your roadmap. As a security professional, you know all too well that privileged access is the gateway to your most valuable assets and is at the core of nearly all security breaches. If you are on the road to implementing a privileged access management (PAM) solution, here are the key use cases to consider.
  • Attack Vectors Thwarted by Least Privilege on the Endpoint Recorded: Dec 1 2020 40 mins
    Kevin Jermyn, Federal Customer Success Manager
    Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies. Learn about attack vectors exploiting excessive privilege on the endpoint and how Least Privilege methodology can thwart these attacks.
  • Federal Agencies: A Risk Based Approach to Insider Threat Detection Recorded: Nov 24 2020 41 mins
    Kevin Jermyn, Federal Customer Success Manager
    Malicious insiders have been and continue to be a major threat to the United States government. Regardless of motivation, when an insider decides to go rogue they can cause severe damage to an agency and, in some cases, even adversely impact the state of national security.

    We highlight how:
    •U.S. Federal Government agencies can put in place effective countermeasures to combat insider threats
    •Provide granular level access to critical systems and applications
    •Effectively manage and monitor all privileged access activity through CaC authentication and PKI compliance
  • Innovation in Government: Fighting Cyber Threats with Identity Management Recorded: Nov 18 2020 52 mins
    Government Cyber Leaders
    At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.
  • The Extended Benefits of Single Sign-On Solutions Recorded: Nov 17 2020 43 mins
    Stas Neyman, Director of Product Marketing
    Today, Single Sign-On (SSO) is a de facto standard for managing employee access to applications and systems. SSO eliminates the need for individual passwords for each application or system account and replaces them with a single set of credentials. The obvious and immediate benefits of Single Sign-On include drastically improved end-user experience, simplified access to corporate resources, and more robust identity security controls.

    However, there are many additional, long-term benefits organizations can realize by implementing SSO solutions that are frequently overlooked during initial discussions. For example, with properly configured self-service tools, companies can significantly reduce their IT costs by reducing the number of password-related help-desk tickets and calls. In addition, SSO can eliminate the risk accounts that remain active when employees change roles or leave companies.

    In this webinar, we’ll discuss the short-term and long-term benefits of modern SSO solutions and highlight the functionality needed to realize these benefits.
  • Zero Trust: Identity Security Recorded: Nov 10 2020 41 mins
    Kevin Jermyn, Federal Customer Success Manager
    Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies. Learn how CyberArk fits into a Zero Trust architecture and allows for significant risk reduction and security for both human and non-person entities (RPA, DevSecOps, etc). Leverage privilege identities remotely in a secure, VPN-less, user friendly workflow to ensure security no matter where access is needed from.
  • Modernize DevOps with CyberArk Secrets Management and Red Hat OpenShift Recorded: Nov 10 2020 50 mins
    Jody Hunt, Strategic Solutions Engineer, CyberArk
    The recent takeover of Twitter accounts highlights how vulnerable we can be to social engineering and other exploits. How did the Twitter breach happen and what lessons can we learn to make containerized applications more secure?

    You can improve and simplify the security of Red Hat® OpenShift® containerized environments with CyberArk Secrets Management solutions, and out-of-the-box certified integrations. A centralized approach to Secrets Management can help strengthen containerized application security, without impacting developer velocity, and accelerate deployments.

    This webinar will cover:
    - Lessons learned from Twitter and other recent breaches that apply to containerized apps and DevOps environments.
    - The challenges and requirements for securing Red Hat OpenShift containerized environments at enterprise scale.
    - The benefits of enhancing the native Secrets Management and security capabilities of Red Hat OpenShift, with CyberArk’s certified integrations and centralized approach.
    - Practical steps to get started using CyberArk’s Conjur open-source Secrets Management solution.

    Jody is a Strategic Solutions Engineer at CyberArk. He has held diverse technical roles throughout his career in software development, sales and marketing. He has been an enthusiastic promoter of DevOps principles since 2010. In 2015, he became aware of the growing security gap represented by automation. That led him to Conjur, Inc. in January of 2017, just four months before the Secrets Management company’s acquisition by CyberArk.

    This webinar is co-hosted in partnership with CyberArk and Red Hat. As a result, both Red Hat and CyberArk are collecting your personal data when you submit such information as part of the registration process above.
    For more information on each party’s privacy practices, please see:
    Red Hat’s Privacy Statement: www.redhat.com/en/about/privacy-policy
    CyberArk’s privacy policy: www.cyberark.com/privacy-policy
  • Security Spotlight: Explosion of Identities & Proliferation of Privileged Access Recorded: Nov 9 2020 52 mins
    CyberArk
    In the past six months, organizations had to swiftly change or accelerate priorities to align with business continuity requirements driven by remote work and other digital transformation programs. As we approach a new year, we have greater visibility about the blind spots that were created along the way. There has been an explosion of identities in use, and we know that any user type (human or not) can have elevated privileges at any time. And, increasingly it’s business users that have elevated access that must be secured with minimal friction.

    Join us on November 9th to learn:
    1. What is driving explosion of IDs how to leverage automation, AI and ML to ensure security keeps pace
    2. How to build a unified security architecture
    3. How to remove silos and share threat intel across tools
CyberArk the leader in Privilege Access Management
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Privileged Access Management Fundamentals: Secure Your Success
  • Live at: Jul 14 2020 6:00 pm
  • Presented by: Nir Gertner, Chief Security Strategist and Noam Liran, Director of Customer Success
  • From:
Your email has been sent.
or close