Hi [[ session.user.profile.firstName ]]

Privileged Access Management as a Service: Why You Need it Now More Than Ever

New to Privileged Access Management (PAM)? If so, you may want to hit the “skip” button on all the catchphrases, lingo, acronyms, and buzzwords that can make learning cyber security (and specifically PAM) more complicated than it needs to be. Sometimes concepts are best learned in simple terms and basic language.

You are invited to attend this webinar to jumpstart your understanding of privileged access management, how to run it “as a service”, and many other concepts to help you accelerate your cyber security efforts for your company.

You will also receive a free eBook “Privileged Access Management as a Service for Dummies” after attending the webinar which will help you explore these topics in more depth.

The webinar will cover the following topics in a conversational setting:
• Defining “Privilege Access Management (PAM)” and “PAM as a Service”
• Understanding the risks of privileged access
• How privileged access can be secured via people, process, and technology
• How to secure privileged access for:
o On-premises assets
o Cloud and dynamic applications
• How to get started with PAM as a Service
• Six action items you should investigate right now (things you can immediately take away from the webinar)

Presenters:
Aaron Pritz, CEO and Co-Founder of Reveal Risk (a boutique cyber security, data privacy and risk management consultancy).
Aaron is an experienced cross-functional Information Security leader with a diverse background encompassing process improvement, the management of complex IT projects, innovative strategy development, audit/compliance programs.

Brandon Traffanstedt, Global Director of Systems Engineering for CyberArk
Brandon serves as a technical advisor and subject matter expert on privileged access and securing emergent technologies. With over 10 years in the combined spaces of information security, development, and systems engineering, Brandon has architected security solutions for some of CyberArk's largest global customers
Recorded Jul 29 2020 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
CyberArk
Presentation preview: Privileged Access Management as a Service: Why You Need it Now More Than Ever

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Least Privilege as Code: Standardizing Management of Cloud Entitlements Recorded: Aug 4 2021 50 mins
    Adam Markert, Principal Solutions Architect, CyberArk
    Security at scale requires consistent controls.

    Cloud security and operations teams must be careful to consistently define processes for provisioning, reviewing, and removing IAM permissions. Otherwise, accelerating cloud adoption can lead to permissions sprawl and excessive access that can be manipulated by attackers.

    The tried-and-true principle of least privilege access – in which all identities have the minimum necessary permissions to function – can help. But without automated, efficient processes to map and manage permissions at scale, least privilege can be easier said than done.

    Join CyberArk Principal Solutions Engineer Adam Markert for a breakdown of:
    -Recent growth in the landscape of possible permissions across AWS, Azure and GCP
    -Least privilege access – what it is and how to get there in the cloud
    -IAM best practices from governments, compliance frameworks and cloud providers
    -Strategies for building scalable, consistent controls and automation workflows to review and remove risky access
  • Securing DevOps 101 Recorded: Jul 28 2021 32 mins
    Jed Knopf, DevOps Solutions Engineer, CyberArk
    "Shift Left" with security into development workflows
  • State of Cloud Security: How do we get to Consistent Least Privilege? Recorded: Jul 27 2021 38 mins
    Brandon Traffanstedt, Identity Security Solutions Strategy & Chris Maroun, Identity Security Solutions Strategy
    IAM is a foundational cloud security control. For years, AWS, Azure and GCP have stressed that
    least privilege access for all human and machine identities is a security best practice.

    Yet as Cloud Providers introduce new features and companies adopt more than one Cloud Provider, proper oversight of access to critical infrastructure and workloads grows more challenging. Recent breaches have made it clear even world-class security organizations can struggle with least privilege.

    So what do organizations need to know as they look to address the visibility and configuration
    challenges of traditional cloud IAM tools?

    Join Brandon Traffanstedt and Chris Maroun, Senior Directors from CyberArk’s Global Technology Office, as they explore the state of cloud security and discuss:

    • Lessons from recent breaches involving excessive permissions
    • Identifying and mapping risky, misconfigured and unused entitlements for all cloud entities
    • Right-sizing IAM policies to defend against external and insider threats
    • When to stick with cloud native IAM and when to turn to third party tools
    • Structuring a holistic, multi-level security plan that includes implementing and maintaining
    least privilege
  • Ransomware Exposed: Key Learnings from Examining 3 Million Samples Recorded: Jul 15 2021 43 mins
    Andy Thompson, Research Evangelist, CyberArk Labs & Brandon Traffanstedt, Senior Director, Global Technology Office
    The first step in the fight against ransomware is to expose it – to explore the different strains, what they have in common and what it is that makes them unique. The team at CyberArk Labs analyzes 100s of new ransomware samples each day and in this webinar, Andy Thompson and Brandon Traffanstedt will disclose their findings of evaluating more than 3 million samples to-date.

    Here’s what is covered:

    - The surge and types of ransomware prevalent during the COVID-19 pandemic
    - How ransomware has evolved over the years to become such a formidable threat, including the role of Bitcoin
    - The kill-chain and path to encryption of today’s modern, dynamic ransomware
    - A review of mitigation strategies and recommendations
  • Remote and Hybrid Workplace Endpoint Security Recorded: Jul 13 2021 51 mins
    Masha Sedova, Elevate Security | Ian Goodhart, Maryland Department of Information Technology | Matt Balderstone, CyberArk
    Endpoint security remains a major challenge for organizations, and in November 2020, Cybersecurity Ventures predicted that global cybercrime costs will reach $10.5 trillion USD a year by 2025. That’s more than triple the amount that it was in 2015. With remote working still very much the norm, and hybrid workforces emerging, it is becoming increasingly difficult to keep track of multiple endpoints and the risk they carry.

    With the threatscape continuing to evolve and cyber attacks becoming even more sophisticated, experts are here to share how security leaders can take the complication out of endpoint security.

    Join us to learn:
    - Common endpoint threats from the first half of 2021
    - Emerging endpoint threats and what to prepare for going forward
    - Leading endpoint protection strategies and how they can be integrated into your existing security solutions
    - And more

    Moderator: Masha Sedova, Co-Founder & President, Elevate Security
    Panelists: Ian Goodhart, Director of Security Operations, Maryland Department of Information Technology (DoIT)
    Matt Balderstone, Cybersecurity Advisor, CyberArk
  • Zero Trust in a Post-COVID World Recorded: Jun 29 2021 53 mins
    Corey Williams and Todd Moseley
    Even as the pandemic eases, the changes it has wrought will last. Your people, employees, faculty, staff, and students won't be 100% back on-site. Identity is your new perimeter.

    Old-school perimeter-based security relies on separating the "bad guys" from the "good guys". Zero Trust assumes that the bad guys are already in your network and have access to your applications and systems. Zero Trust works on the principle "never trust, always verify".

    Join this webinar to learn best practices on how organizations will continue implementing Zero Trust architectures in the nearing "post-COVID" world. While Zero Trust is a strong approach to addressing modern cybersecurity threats, you will need technology, process, and people to implement necessary controls. You need to secure devices and identities without disrupting everyday operations.

    In this webinar, CyberArk will share how to:
    • Verify every user. Strong, context-aware, multi-factor authentication mitigates the risk of stolen passwords.
    • Validate every device. Only allow registered devices with good security posture to access resources.
    • Leave no endpoint unprotected. Keep your endpoints secure - from servers to workstations to remote devices.
  • Why integrating PAM and IAM is essential to your Identity Security strategy Recorded: Jun 29 2021 40 mins
    Khizar Sultan Sr. Director of Access Solution Strategy, CyberArk
    While several years ago only small groups of users (mostly IT admins) were considered privileged, in today’s enterprises, any identity – whether employee, remote worker, third-party vendor, device or application – can become privileged under certain conditions, creating an attack path to an organization’s most valuable assets. This means that companies must be able to secure every type of identity at any stage of the identity lifecycle to protect themselves from cyberthreats.

    While Privileged Access Management (PAM) and Identity Access Management (IAM) solutions independently address specific identity-related threats, only fully-integrated solutions can provide end-to-end identity security and visibility needed by enterprises today. Integrated PAM and IAM solutions can accurately authenticate identities, grant proper permissions, and authorize access to all types of protected resources in a structured manner – all in a way that can be monitored and audited.

    In this webinar learn how CyberArk’s integrated PAM and IAM solution can help you to:

    - Manage the lifecycle of the workforce and privileged identities across the organization
    - Control access to business applications and infrastructure
    - Provide VPN-less and passwordless remote access to cloud and on-premise resources
    - Enable users to elevate their workstation privileges with strong authentication
    - Protect high-risk web application sessions with continuous authentication and auditing
  • Least Privilege as Code: Standardizing Management of Cloud Entitlements Recorded: Jun 28 2021 50 mins
    Adam Markert, Principal Solutions Architect, CyberArk
    Security at scale requires consistent controls.

    Cloud security and operations teams must be careful to consistently define processes for provisioning, reviewing, and removing IAM permissions. Otherwise, accelerating cloud adoption can lead to permissions sprawl and excessive access that can be manipulated by attackers.

    The tried-and-true principle of least privilege access – in which all identities have the minimum necessary permissions to function – can help. But without automated, efficient processes to map and manage permissions at scale, least privilege can be easier said than done.

    Join CyberArk Principal Solutions Engineer Adam Markert for a breakdown of:
    -Recent growth in the landscape of possible permissions across AWS, Azure and GCP
    -Least privilege access – what it is and how to get there in the cloud
    -IAM best practices from governments, compliance frameworks and cloud providers
    -Strategies for building scalable, consistent controls and automation workflows to review and remove risky access
  • Securing DevOps 101 Recorded: Jun 25 2021 32 mins
    Jed Knopf, DevOps Solutions Engineer, CyberArk
    "Shift Left" with security into development workflows
  • Proactive Prevention Starts By Assuming-Breach Recorded: May 11 2021 48 mins
    Brandon Traffanstedt, Sr. Director at CyberArk
    Proactive Prevention Starts By Assuming-Breach: Securing Powerful Access From Dynamic Threats

    Today’s cyber security strategy must secure access at all layers of the environment: from remote endpoints and devices to core databases and servers deep in the datacenter – whether located on prem, in the cloud, or both.

    Dynamic, increasingly complex environments present rich hunting grounds for bad actors and cyber criminals. Coupled with the proliferation of systems accessed by automated, machine-to-machine applications, bots, and cloud-based components like containers – the concern is immediate.

    From new types of ransomware to advanced supply chain attacks – as cyberattacks become ever-more sophisticated, how do you secure your organization?

    Join this session to start thinking like an attacker as we review how to adopt an “Assume-Breach” mindset to prevent attackers from circumventing access controls to penetrate and propagate within your environments. Through a Defense-in-Depth approach to security, Brandon Traffanstedt, Sr. Director at CyberArk, will explore how you can implement policies and controls that detect and isolate adversaries before they traverse your network and inflict serious damage.
  • Preventing the Big One: Staying Ahead of the Breach Recorded: May 11 2021 54 mins
    Michelle Drolet, Towerwall| Andy Thompson, CyberArk| Nico Fischbach, Forcepoint| Satya Gupta, Virsec| Micheal Meyer, MRSBPO
    Over 37 billion records were exposed in breach events in 2020 - by far the most records exposed in a single year, according to a recent report by Risk Based Security. How has remote working impacted your organization's security posture? What lessons can security professionals learn from the recent wave of breaches and what steps can enterprises take to strengthen security in 2021?

    This keynote panel of security experts and industry leaders will explore the best practices for breach prevention, as well as share real-life lessons from the frontlines on what works and doesn't work.

    Viewers will learn more about:
    - The reality of data breaches
    - Why data breach severity is rising
    - Ransomware attacks on the rise (doubling from 2019 to 2020) and the threat to businesses
    - Technologies that help with breach prevention, detection and response
    - Why security awareness matters and best practices for educating employees to be cyber secure

    Moderated by:
    Michelle Drolet, CEO, Towerwall
    Nico Fischbach, Global CTO, Forcepoint
    Micheal Meyer, Chief Risk and Innovation Officer, MRSBPO
    Andy Thompson, Research Evangelist, CyberArk
    Satya Gupta, CTO & Founder, Virsec
  • The Future of Access Management Recorded: Apr 27 2021 46 mins
    Stas Neyman, Director of Product Marketing and Khizar Sultan, Sr Director of Access Solution Strategy
    Access management is an essential component of the Zero Trust security model and a central pillar of the enterprise technology portfolio. CIOs and CISOs use Access Management solutions to protect companies from security breaches, while business leaders leverage AM technologies to enhance productivity, improve operational efficiency, and enable new business initiatives. However, as IT and business environments change, Access Management capabilities must evolve to address the new challenges and threats.

    Join us to learn about the emerging trends in the Access Management space, see how AM can secure hybrid IT environments, and get a sneak peek at the next generation of CyberArk’s AM capabilities.

    After attending the webinar, you will be able to:

    -Understand how changes in IT environments and business drivers are shaping Access Management space
    -Determine which security-focused capabilities are becoming increasingly important
    -Evaluate CyberArk Identity against legacy and modern IAM solutions
    -Gain insight into the next generation of CyberArk’s Access Management capabilities
  • State of Cloud Security: How do we get to Consistent Least Privilege? Recorded: Mar 18 2021 38 mins
    Brandon Traffanstedt, Identity Security Solutions Strategy & Chris Maroun, Identity Security Solutions Strategy
    IAM is a foundational cloud security control. For years, AWS, Azure and GCP have stressed that
    least privilege access for all human and machine identities is a security best practice.

    Yet as Cloud Providers introduce new features and companies adopt more than one Cloud Provider, proper oversight of access to critical infrastructure and workloads grows more challenging. Recent breaches have made it clear even world-class security organizations can struggle with least privilege.

    So what do organizations need to know as they look to address the visibility and configuration
    challenges of traditional cloud IAM tools?

    Join Brandon Traffanstedt and Chris Maroun, Senior Directors from CyberArk’s Global Technology Office, as they explore the state of cloud security and discuss:

    • Lessons from recent breaches involving excessive permissions
    • Identifying and mapping risky, misconfigured and unused entitlements for all cloud entities
    • Right-sizing IAM policies to defend against external and insider threats
    • When to stick with cloud native IAM and when to turn to third party tools
    • Structuring a holistic, multi-level security plan that includes implementing and maintaining
    least privilege
  • The Anatomy of the SolarWinds Attack Recorded: Mar 18 2021 44 mins
    Lavi Lazarovitz, Director of Cyber Research, CyberArk Labs & Andy Thompson, Research Evangelist, CyberArk Lab
    In early December 2020, a supply chain attack was discovered which “trojanized” SolarWinds Orion business software updates in order to distribute malware. The campaign successfully infected 18,000 organizations – including a number of government agencies and high-value companies around the world.

    Attacks of this magnitude and sophistication have a vast and rippling impact. Whether you have been directly affected or not – we are witnessing a new level of attack sophistication that demands a closer understanding.

    Learn from the team that discovered the Golden SAML attack vector back in 2017 – an innovative technique now seen used for the first time in the SolarWinds attack. What we’ll cover:
    • The rise of the digital supply chain attack
    • An attacker’s perspective on Orion
    • An end-to-end review of the attack flow
    • How the attackers managed to trojanize SolarWinds code
    • What the attackers did during months of seeming inactivity
    • A review of the Golden SAML technique
    • The big picture – what ‘Solorigate’ means for attackers and defenders.
  • [Panel] Securing a MultiCloud Environment Recorded: Mar 15 2021 60 mins
    Jo Peterson, Ed Featherston, Nissim Pariente, Stan Lowe and Brandon Traffanstedt
    According to the Flexera 2020 State of the Cloud Report, 93 percent of enterprises have a multi-cloud strategy.

    In this session we’ll explore some of the critical challenges that a multi cloud environment can present around security such as access, hypercomplexity and reduced visibility.

    We’ll review options around:
    - Cloud Security Frameworks
    - Multi-Cloud Security Best Practices
    - Specific Tips to Strengthen Cloud Security Configurations
  • Federal Agencies: A Risk Based Approach to Insider Threat Detection Recorded: Mar 9 2021 41 mins
    Kevin Jermyn, Federal Customer Success Manager
    Malicious insiders have been and continue to be a major threat to the United States government. Regardless of motivation, when an insider decides to go rogue they can cause severe damage to an agency and, in some cases, even adversely impact the state of national security.

    We highlight how:
    •U.S. Federal Government agencies can put in place effective countermeasures to combat insider threats
    •Provide granular level access to critical systems and applications
    •Effectively manage and monitor all privileged access activity through CaC authentication and PKI compliance
  • Innovation in Government: Fighting Cyber Threats with Identity Management Recorded: Mar 3 2021 52 mins
    Government Cyber Leaders
    At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.
  • Zero Trust: Identity Security Recorded: Feb 23 2021 41 mins
    Kevin Jermyn, Federal, Customer Success Manager
    Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies.

    Learn how CyberArk fits into a Zero Trust architecture and allows for significant risk reduction and security for both human and non-person entities (RPA, DevSecOps, etc). Leverage privilege identities remotely in a secure, VPN-less, user friendly workflow to ensure security no matter where access is needed from.
  • Protecting the enterprise with secure, automated processes Recorded: Feb 17 2021 37 mins
    Joe Garcia, DevOps Security Engineer, CyberArk
    We all recognize automation can drive dramatic improvements in operational efficiency, but as recent attacks in the software supply chain highlight – automated processes also need to be secure.

    This session provides tips to improve the security of automation processes running on Red Hat® Ansible® Automation Platform. Gain a better understanding of how open source and enterprise security tools address:

    - How CyberArk’s secrets manager secures credentials used by Red Hat Ansible, including examples with Ansible collections, to automatically onboard secrets as they are created.

    - Using Red Hat® Ansible® Tower’s built-in CyberArk secret lookups to remove SSH private keys and root account passwords out of Tower Credentials and Red Hat Ansible playbooks. Learn how to use a “just-in-time” (JIT) approach to give Playbooks access to credentials.

    You’ll leave this webinar with the tools you need to start strengthening the security of your organization's Red Hat Ansible Automation processes and playbooks.

    Joe Garcia is a DevOps Security Engineer at CyberArk. He is currently focused on helping customers implement and scale effective secrets management solutions. As CyberArk's subject-matter expert in automation, Joe Garcia shares CyberArk's vision of building a security community that is as agile as the automation they are securing in today's fast-paced environments.

    This webinar is co-hosted in partnership with CyberArk and Red Hat. As a result, both Red Hat and CyberArk are collecting your personal data when you submit such information as part of the registration process above. For more information on each party’s privacy practices, please see:
    Red Hat's Privacy Statement: www.redhat.com/en/about/privacy-policy
    CyberArk's privacy statement: www.cyberark.com/privacy-policy
  • Cloud Security Must: Ensuring Least Privilege Recorded: Dec 17 2020 30 mins
    Josh Kirkwood, Solutions Engineering Manager, CyberArk
    The principle of least privilege access – in which all human and machine identities should have only the permissions essential to perform their intended function – is a cloud security best practice promoted by cloud providers like Azure, GCP and leading industry frameworks like MITRE ATT&CK and Cloud Security Alliance’s Cloud Controls Matrix. In this webinar, attendees will learn about the risks of overly broad permissions and how to address them.

    What you’ll walk away with:

    - Discover the role of excessive permissions in data breaches
    - Learn best practices for identifying and remediating excessive permissions in cloud environments
    - Explore free and open source tools to gain visibility across multiple cloud environments
    - Develop a plan to continuously verify least privilege and meet regulatory + Industry compliance objectives
CyberArk the leader in Privilege Access Management
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Privileged Access Management as a Service: Why You Need it Now More Than Ever
  • Live at: Jul 29 2020 6:00 pm
  • Presented by: CyberArk
  • From:
Your email has been sent.
or close