Hi [[ session.user.profile.firstName ]]

Privileged Access Management as a Service: Why You Need it Now More Than Ever

New to Privileged Access Management (PAM)? If so, you may want to hit the “skip” button on all the catchphrases, lingo, acronyms, and buzzwords that can make learning cyber security (and specifically PAM) more complicated than it needs to be. Sometimes concepts are best learned in simple terms and basic language.

You are invited to attend this webinar to jumpstart your understanding of privileged access management, how to run it “as a service”, and many other concepts to help you accelerate your cyber security efforts for your company.

You will also receive a free eBook “Privileged Access Management as a Service for Dummies” after attending the webinar which will help you explore these topics in more depth.

The webinar will cover the following topics in a conversational setting:
• Defining “Privilege Access Management (PAM)” and “PAM as a Service”
• Understanding the risks of privileged access
• How privileged access can be secured via people, process, and technology
• How to secure privileged access for:
o On-premises assets
o Cloud and dynamic applications
• How to get started with PAM as a Service
• Six action items you should investigate right now (things you can immediately take away from the webinar)

Presenters:
Aaron Pritz, CEO and Co-Founder of Reveal Risk (a boutique cyber security, data privacy and risk management consultancy).
Aaron is an experienced cross-functional Information Security leader with a diverse background encompassing process improvement, the management of complex IT projects, innovative strategy development, audit/compliance programs.

Brandon Traffanstedt, Global Director of Systems Engineering for CyberArk
Brandon serves as a technical advisor and subject matter expert on privileged access and securing emergent technologies. With over 10 years in the combined spaces of information security, development, and systems engineering, Brandon has architected security solutions for some of CyberArk's largest global customers
Recorded Jul 29 2020 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
CyberArk
Presentation preview: Privileged Access Management as a Service: Why You Need it Now More Than Ever

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Anatomy of the SolarWinds Attack Mar 18 2021 2:00 pm UTC 44 mins
    Lavi Lazarovitz, Director of Cyber Research, CyberArk Labs & Andy Thompson, Research Evangelist, CyberArk Lab
    In early December 2020, a supply chain attack was discovered which “trojanized” SolarWinds Orion business software updates in order to distribute malware. The campaign successfully infected 18,000 organizations – including a number of government agencies and high-value companies around the world.

    Attacks of this magnitude and sophistication have a vast and rippling impact. Whether you have been directly affected or not – we are witnessing a new level of attack sophistication that demands a closer understanding.

    Learn from the team that discovered the Golden SAML attack vector back in 2017 – an innovative technique now seen used for the first time in the SolarWinds attack. What we’ll cover:
    • The rise of the digital supply chain attack
    • An attacker’s perspective on Orion
    • An end-to-end review of the attack flow
    • How the attackers managed to trojanize SolarWinds code
    • What the attackers did during months of seeming inactivity
    • A review of the Golden SAML technique
    • The big picture – what ‘Solorigate’ means for attackers and defenders.
  • Federal Agencies: A Risk Based Approach to Insider Threat Detection Mar 9 2021 6:00 pm UTC 41 mins
    Kevin Jermyn, Federal Customer Success Manager
    Malicious insiders have been and continue to be a major threat to the United States government. Regardless of motivation, when an insider decides to go rogue they can cause severe damage to an agency and, in some cases, even adversely impact the state of national security.

    We highlight how:
    •U.S. Federal Government agencies can put in place effective countermeasures to combat insider threats
    •Provide granular level access to critical systems and applications
    •Effectively manage and monitor all privileged access activity through CaC authentication and PKI compliance
  • Innovation in Government: Fighting Cyber Threats with Identity Management Recorded: Mar 3 2021 52 mins
    Government Cyber Leaders
    At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.
  • Zero Trust: Identity Security Recorded: Feb 23 2021 41 mins
    Kevin Jermyn, Federal, Customer Success Manager
    Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies.

    Learn how CyberArk fits into a Zero Trust architecture and allows for significant risk reduction and security for both human and non-person entities (RPA, DevSecOps, etc). Leverage privilege identities remotely in a secure, VPN-less, user friendly workflow to ensure security no matter where access is needed from.
  • Protecting the enterprise with secure, automated processes Recorded: Feb 17 2021 37 mins
    Joe Garcia, DevOps Security Engineer, CyberArk
    We all recognize automation can drive dramatic improvements in operational efficiency, but as recent attacks in the software supply chain highlight – automated processes also need to be secure.

    This session provides tips to improve the security of automation processes running on Red Hat® Ansible® Automation Platform. Gain a better understanding of how open source and enterprise security tools address:

    - How CyberArk’s secrets manager secures credentials used by Red Hat Ansible, including examples with Ansible collections, to automatically onboard secrets as they are created.

    - Using Red Hat® Ansible® Tower’s built-in CyberArk secret lookups to remove SSH private keys and root account passwords out of Tower Credentials and Red Hat Ansible playbooks. Learn how to use a “just-in-time” (JIT) approach to give Playbooks access to credentials.

    You’ll leave this webinar with the tools you need to start strengthening the security of your organization's Red Hat Ansible Automation processes and playbooks.

    Joe Garcia is a DevOps Security Engineer at CyberArk. He is currently focused on helping customers implement and scale effective secrets management solutions. As CyberArk's subject-matter expert in automation, Joe Garcia shares CyberArk's vision of building a security community that is as agile as the automation they are securing in today's fast-paced environments.

    This webinar is co-hosted in partnership with CyberArk and Red Hat. As a result, both Red Hat and CyberArk are collecting your personal data when you submit such information as part of the registration process above. For more information on each party’s privacy practices, please see:
    Red Hat's Privacy Statement: www.redhat.com/en/about/privacy-policy
    CyberArk's privacy statement: www.cyberark.com/privacy-policy
  • Cloud Security Must: Ensuring Least Privilege Recorded: Dec 17 2020 30 mins
    Josh Kirkwood, Solutions Engineering Manager, CyberArk
    The principle of least privilege access – in which all human and machine identities should have only the permissions essential to perform their intended function – is a cloud security best practice promoted by cloud providers like Azure, GCP and leading industry frameworks like MITRE ATT&CK and Cloud Security Alliance’s Cloud Controls Matrix. In this webinar, attendees will learn about the risks of overly broad permissions and how to address them.

    What you’ll walk away with:

    - Discover the role of excessive permissions in data breaches
    - Learn best practices for identifying and remediating excessive permissions in cloud environments
    - Explore free and open source tools to gain visibility across multiple cloud environments
    - Develop a plan to continuously verify least privilege and meet regulatory + Industry compliance objectives
  • Top Attack Paths in the Cloud Recorded: Dec 8 2020 45 mins
    Brandon Traffanstedt, Global Solutions Engineer Director
    Security pros detail the common ways bad actors attack your cloud environments
    As organizations just like yours transition to cloud environments, so do the cyber criminals. An inherent lack of visibility across cloud environments and workloads is masking security threats, undermining compliance and governance and compromising the value of cloud adoption. Individual cloud vendors, point security solutions and siloed teams address just one piece of the puzzle, increasing the risk of misconfigurations and inhibiting the ability to prioritize the most serious threats.

    It can be overwhelming for security teams when organizations rush headfirst into the cloud without consulting them, putting data and processes at risk.

    To effectively mitigate risk, you need to know what bad actors are after. This webinar will guide you through the main compromise points and attacks paths in the cloud.

    You will understand:
    •How attack paths in the cloud are different from the ones typical for on-premises infrastructure and resources
    •The danger of privileged credentials compromise in the cloud
    •Understand 3 to 4 of the most common Cloud attack paths and potential mitigation tactics and tools
    •The role of cloud identities and permissions in the overall cloud security posture

    Join this webinar and learn how to combat bad actors in the cloud. Bring your questions and concern, we will have a live Q&A session with the CyberArk security pro!
  • Uncovering the True Impact of Digital Transformation Recorded: Dec 2 2020 29 mins
    CyberArk
    In today’s mostly digital world, the increased number and sophistication of cyber attacks amplifies the need for consistent security controls across the IT infrastructure, cloud environments, RPA, DevOps and any digital initiative on your roadmap. As a security professional, you know all too well that privileged access is the gateway to your most valuable assets and is at the core of nearly all security breaches. If you are on the road to implementing a privileged access management (PAM) solution, here are the key use cases to consider.
  • Attack Vectors Thwarted by Least Privilege on the Endpoint Recorded: Dec 1 2020 40 mins
    Kevin Jermyn, Federal Customer Success Manager
    Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies. Learn about attack vectors exploiting excessive privilege on the endpoint and how Least Privilege methodology can thwart these attacks.
  • Federal Agencies: A Risk Based Approach to Insider Threat Detection Recorded: Nov 24 2020 41 mins
    Kevin Jermyn, Federal Customer Success Manager
    Malicious insiders have been and continue to be a major threat to the United States government. Regardless of motivation, when an insider decides to go rogue they can cause severe damage to an agency and, in some cases, even adversely impact the state of national security.

    We highlight how:
    •U.S. Federal Government agencies can put in place effective countermeasures to combat insider threats
    •Provide granular level access to critical systems and applications
    •Effectively manage and monitor all privileged access activity through CaC authentication and PKI compliance
  • Innovation in Government: Fighting Cyber Threats with Identity Management Recorded: Nov 18 2020 52 mins
    Government Cyber Leaders
    At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.
  • The Extended Benefits of Single Sign-On Solutions Recorded: Nov 17 2020 43 mins
    Stas Neyman, Director of Product Marketing
    Today, Single Sign-On (SSO) is a de facto standard for managing employee access to applications and systems. SSO eliminates the need for individual passwords for each application or system account and replaces them with a single set of credentials. The obvious and immediate benefits of Single Sign-On include drastically improved end-user experience, simplified access to corporate resources, and more robust identity security controls.

    However, there are many additional, long-term benefits organizations can realize by implementing SSO solutions that are frequently overlooked during initial discussions. For example, with properly configured self-service tools, companies can significantly reduce their IT costs by reducing the number of password-related help-desk tickets and calls. In addition, SSO can eliminate the risk accounts that remain active when employees change roles or leave companies.

    In this webinar, we’ll discuss the short-term and long-term benefits of modern SSO solutions and highlight the functionality needed to realize these benefits.
  • Zero Trust: Identity Security Recorded: Nov 10 2020 41 mins
    Kevin Jermyn, Federal Customer Success Manager
    Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies. Learn how CyberArk fits into a Zero Trust architecture and allows for significant risk reduction and security for both human and non-person entities (RPA, DevSecOps, etc). Leverage privilege identities remotely in a secure, VPN-less, user friendly workflow to ensure security no matter where access is needed from.
  • Modernize DevOps with CyberArk Secrets Management and Red Hat OpenShift Recorded: Nov 10 2020 50 mins
    Jody Hunt, Strategic Solutions Engineer, CyberArk
    The recent takeover of Twitter accounts highlights how vulnerable we can be to social engineering and other exploits. How did the Twitter breach happen and what lessons can we learn to make containerized applications more secure?

    You can improve and simplify the security of Red Hat® OpenShift® containerized environments with CyberArk Secrets Management solutions, and out-of-the-box certified integrations. A centralized approach to Secrets Management can help strengthen containerized application security, without impacting developer velocity, and accelerate deployments.

    This webinar will cover:
    - Lessons learned from Twitter and other recent breaches that apply to containerized apps and DevOps environments.
    - The challenges and requirements for securing Red Hat OpenShift containerized environments at enterprise scale.
    - The benefits of enhancing the native Secrets Management and security capabilities of Red Hat OpenShift, with CyberArk’s certified integrations and centralized approach.
    - Practical steps to get started using CyberArk’s Conjur open-source Secrets Management solution.

    Jody is a Strategic Solutions Engineer at CyberArk. He has held diverse technical roles throughout his career in software development, sales and marketing. He has been an enthusiastic promoter of DevOps principles since 2010. In 2015, he became aware of the growing security gap represented by automation. That led him to Conjur, Inc. in January of 2017, just four months before the Secrets Management company’s acquisition by CyberArk.

    This webinar is co-hosted in partnership with CyberArk and Red Hat. As a result, both Red Hat and CyberArk are collecting your personal data when you submit such information as part of the registration process above.
    For more information on each party’s privacy practices, please see:
    Red Hat’s Privacy Statement: www.redhat.com/en/about/privacy-policy
    CyberArk’s privacy policy: www.cyberark.com/privacy-policy
  • Security Spotlight: Explosion of Identities & Proliferation of Privileged Access Recorded: Nov 9 2020 52 mins
    CyberArk
    In the past six months, organizations had to swiftly change or accelerate priorities to align with business continuity requirements driven by remote work and other digital transformation programs. As we approach a new year, we have greater visibility about the blind spots that were created along the way. There has been an explosion of identities in use, and we know that any user type (human or not) can have elevated privileges at any time. And, increasingly it’s business users that have elevated access that must be secured with minimal friction.

    Join us on November 9th to learn:
    1. What is driving explosion of IDs how to leverage automation, AI and ML to ensure security keeps pace
    2. How to build a unified security architecture
    3. How to remove silos and share threat intel across tools
  • Federal Agencies: A Risk Based Approach to Insider Threat Detection Recorded: Nov 3 2020 42 mins
    Kevin Jermyn, Federal Customer Success Manager
    Malicious insiders have been and continue to be a major threat to the United States government. Regardless of motivation, when an insider decides to go rogue they can cause severe damage to an agency and, in some cases, even adversely impact the state of national security.

    We highlight how:
    •U.S. Federal Government agencies can put in place effective countermeasures to combat insider threats
    •Provide granular level access to critical systems and applications
    •Effectively manage and monitor all privileged access activity through CaC authentication and PKI compliance
  • Top Attack Paths in the Cloud Recorded: Oct 29 2020 46 mins
    Brandon Traffanstedt, Global Solutions Engineer Director
    Security pros detail the common ways bad actors attack your cloud environments
    As organizations just like yours transition to cloud environments, so do the cyber criminals. An inherent lack of visibility across cloud environments and workloads is masking security threats, undermining compliance and governance and compromising the value of cloud adoption. Individual cloud vendors, point security solutions and siloed teams address just one piece of the puzzle, increasing the risk of misconfigurations and inhibiting the ability to prioritize the most serious threats.
    It can be overwhelming for security teams when organizations rush headfirst into the cloud without consulting them, putting data and processes at risk.
    To effectively mitigate risk, you need to know what bad actors are after. This webinar will guide you through the main compromise points and attacks paths in the cloud.
    You will understand:
    •How attack paths in the cloud are different from the ones typical for on-premises infrastructure and resources
    •The danger of privileged credentials compromise in the cloud
    •Understand 3 to 4 of the most common Cloud attack paths and potential mitigation tactics and tools
    •The role of cloud identities and permissions in the overall cloud security posture

    Join this webinar and learn how to combat bad actors in the cloud. Bring your questions and concern, we will have a live Q&A session with the CyberArk security pro!
  • Four Key Recommendations for Securing Remote Work Recorded: Oct 27 2020 44 mins
    Corey Williams, Head of Identity Marketing at CyberArk
    Remote work is quickly becoming the permanent “new normal”, and attackers have stepped their efforts to take advantage of the situation. They know a dramatic shift in work has resulted in an innumerable number of holes even in carefully crafted security programs.

    Join us for a discussion on key recommendations for securing remote work in the face of this new — and at least partially permanent — normal. We will discuss how to secure:

    • remote workforce access to on-prem and cloud apps
    • users access to their PC and Mac endpoints
    • local admin accounts to thwart malware and ransomware attacks
    • remote access to on-premises systems and resources by 3rd party vendors
  • Best of IMPACT Series: A Customer's Journey Through Privileged Access Management Recorded: Oct 6 2020 24 mins
    Gerry Owens, CEO and Founder GOTAB IT RISK Inc.
    Experience the journey through a Privileged Access Management (PAM) program, as it enables business capabilities, drives efficiencies and reduces risk. Attend this session if you are an IAM leader or an executive interested in understanding how PAM can positively impact your organization, complement your enterprise risk framework, and align to your overall cybersecurity strategy. Gain insights into PAM experiences through the eyes of a consumer.
  • Best of IMPACT LIVE series: PAM 101: Learn the Basics Recorded: Sep 29 2020 28 mins
    CyberArk
    Why is privileged access so important? Why are attackers inside and outside the enterprise zeroing in on privileged accounts? What can you do to protect your organization? These are the questions that we will be addressing in this introduction to privileged access management session. Understand the basics to better mitigate the risk of malicious insiders or external attackers from gaining access to the heart of the enterprise; and learn the foundational elements within the CyberArk solution to address this challenge.
CyberArk the leader in Privilege Access Management
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Privileged Access Management as a Service: Why You Need it Now More Than Ever
  • Live at: Jul 29 2020 6:00 pm
  • Presented by: CyberArk
  • From:
Your email has been sent.
or close