Hi [[ session.user.profile.firstName ]]

Four Key Recommendations for Securing Remote Work

Remote work is quickly becoming the permanent “new normal”, and attackers have stepped their efforts to take advantage of the situation. They know a dramatic shift in work has resulted in an innumerable number of holes even in carefully crafted security programs.

Join us for a discussion on key recommendations for securing remote work in the face of this new — and at least partially permanent — normal. We will discuss how to secure:

• remote workforce access to on-prem and cloud apps
• users access to their PC and Mac endpoints
• local admin accounts to thwart malware and ransomware attacks
• remote access to on-premises systems and resources by 3rd party vendors
Recorded Oct 27 2020 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Corey Williams, Head of Identity Marketing at CyberArk
Presentation preview: Four Key Recommendations for Securing Remote Work

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cloud Security Must: Ensuring Least Privilege Dec 17 2020 5:00 pm UTC 60 mins
    Josh Kirkwood, Solutions Engineering Manager, CyberArk
    The principle of least privilege access – in which all human and machine identities should have only the permissions essential to perform their intended function – is a cloud security best practice promoted by cloud providers like Azure, GCP and leading industry frameworks like MITRE ATT&CK and Cloud Security Alliance’s Cloud Controls Matrix. In this webinar, attendees will learn about the risks of overly broad permissions and how to address them.

    What you’ll walk away with:

    - Discover the role of excessive permissions in data breaches
    - Learn best practices for identifying and remediating excessive permissions in cloud environments
    - Explore free and open source tools to gain visibility across multiple cloud environments
    - Develop a plan to continuously verify least privilege and meet regulatory + Industry compliance objectives
  • Top Attack Paths in the Cloud Dec 8 2020 5:00 pm UTC 45 mins
    Brandon Traffanstedt, Global Solutions Engineer Director
    Security pros detail the common ways bad actors attack your cloud environments
    As organizations just like yours transition to cloud environments, so do the cyber criminals. An inherent lack of visibility across cloud environments and workloads is masking security threats, undermining compliance and governance and compromising the value of cloud adoption. Individual cloud vendors, point security solutions and siloed teams address just one piece of the puzzle, increasing the risk of misconfigurations and inhibiting the ability to prioritize the most serious threats.

    It can be overwhelming for security teams when organizations rush headfirst into the cloud without consulting them, putting data and processes at risk.

    To effectively mitigate risk, you need to know what bad actors are after. This webinar will guide you through the main compromise points and attacks paths in the cloud.

    You will understand:
    •How attack paths in the cloud are different from the ones typical for on-premises infrastructure and resources
    •The danger of privileged credentials compromise in the cloud
    •Understand 3 to 4 of the most common Cloud attack paths and potential mitigation tactics and tools
    •The role of cloud identities and permissions in the overall cloud security posture

    Join this webinar and learn how to combat bad actors in the cloud. Bring your questions and concern, we will have a live Q&A session with the CyberArk security pro!
  • Uncovering the True Impact of Digital Transformation Dec 2 2020 5:00 pm UTC 29 mins
    CyberArk
    In today’s mostly digital world, the increased number and sophistication of cyber attacks amplifies the need for consistent security controls across the IT infrastructure, cloud environments, RPA, DevOps and any digital initiative on your roadmap. As a security professional, you know all too well that privileged access is the gateway to your most valuable assets and is at the core of nearly all security breaches. If you are on the road to implementing a privileged access management (PAM) solution, here are the key use cases to consider.
  • Attack Vectors Thwarted by Least Privilege on the Endpoint Dec 1 2020 7:00 pm UTC 40 mins
    Kevin Jermyn, Federal Customer Success Manager
    Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies. Learn about attack vectors exploiting excessive privilege on the endpoint and how Least Privilege methodology can thwart these attacks.
  • Federal Agencies: A Risk Based Approach to Insider Threat Detection Recorded: Nov 24 2020 41 mins
    Kevin Jermyn, Federal Customer Success Manager
    Malicious insiders have been and continue to be a major threat to the United States government. Regardless of motivation, when an insider decides to go rogue they can cause severe damage to an agency and, in some cases, even adversely impact the state of national security.

    We highlight how:
    •U.S. Federal Government agencies can put in place effective countermeasures to combat insider threats
    •Provide granular level access to critical systems and applications
    •Effectively manage and monitor all privileged access activity through CaC authentication and PKI compliance
  • Innovation in Government: Fighting Cyber Threats with Identity Management Recorded: Nov 18 2020 52 mins
    Government Cyber Leaders
    At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.
  • The Extended Benefits of Single Sign-On Solutions Recorded: Nov 17 2020 43 mins
    Stas Neyman, Director of Product Marketing
    Today, Single Sign-On (SSO) is a de facto standard for managing employee access to applications and systems. SSO eliminates the need for individual passwords for each application or system account and replaces them with a single set of credentials. The obvious and immediate benefits of Single Sign-On include drastically improved end-user experience, simplified access to corporate resources, and more robust identity security controls.

    However, there are many additional, long-term benefits organizations can realize by implementing SSO solutions that are frequently overlooked during initial discussions. For example, with properly configured self-service tools, companies can significantly reduce their IT costs by reducing the number of password-related help-desk tickets and calls. In addition, SSO can eliminate the risk accounts that remain active when employees change roles or leave companies.

    In this webinar, we’ll discuss the short-term and long-term benefits of modern SSO solutions and highlight the functionality needed to realize these benefits.
  • Zero Trust: Identity Security Recorded: Nov 10 2020 41 mins
    Kevin Jermyn, Federal Customer Success Manager
    Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies. Learn how CyberArk fits into a Zero Trust architecture and allows for significant risk reduction and security for both human and non-person entities (RPA, DevSecOps, etc). Leverage privilege identities remotely in a secure, VPN-less, user friendly workflow to ensure security no matter where access is needed from.
  • Modernize DevOps with CyberArk Secrets Management and Red Hat OpenShift Recorded: Nov 10 2020 50 mins
    Jody Hunt, Strategic Solutions Engineer, CyberArk
    The recent takeover of Twitter accounts highlights how vulnerable we can be to social engineering and other exploits. How did the Twitter breach happen and what lessons can we learn to make containerized applications more secure?

    You can improve and simplify the security of Red Hat® OpenShift® containerized environments with CyberArk Secrets Management solutions, and out-of-the-box certified integrations. A centralized approach to Secrets Management can help strengthen containerized application security, without impacting developer velocity, and accelerate deployments.

    This webinar will cover:
    - Lessons learned from Twitter and other recent breaches that apply to containerized apps and DevOps environments.
    - The challenges and requirements for securing Red Hat OpenShift containerized environments at enterprise scale.
    - The benefits of enhancing the native Secrets Management and security capabilities of Red Hat OpenShift, with CyberArk’s certified integrations and centralized approach.
    - Practical steps to get started using CyberArk’s Conjur open-source Secrets Management solution.

    Jody is a Strategic Solutions Engineer at CyberArk. He has held diverse technical roles throughout his career in software development, sales and marketing. He has been an enthusiastic promoter of DevOps principles since 2010. In 2015, he became aware of the growing security gap represented by automation. That led him to Conjur, Inc. in January of 2017, just four months before the Secrets Management company’s acquisition by CyberArk.

    This webinar is co-hosted in partnership with CyberArk and Red Hat. As a result, both Red Hat and CyberArk are collecting your personal data when you submit such information as part of the registration process above.
    For more information on each party’s privacy practices, please see:
    Red Hat’s Privacy Statement: www.redhat.com/en/about/privacy-policy
    CyberArk’s privacy policy: www.cyberark.com/privacy-policy
  • Security Spotlight: Explosion of Identities & Proliferation of Privileged Access Recorded: Nov 9 2020 52 mins
    CyberArk
    In the past six months, organizations had to swiftly change or accelerate priorities to align with business continuity requirements driven by remote work and other digital transformation programs. As we approach a new year, we have greater visibility about the blind spots that were created along the way. There has been an explosion of identities in use, and we know that any user type (human or not) can have elevated privileges at any time. And, increasingly it’s business users that have elevated access that must be secured with minimal friction.

    Join us on November 9th to learn:
    1. What is driving explosion of IDs how to leverage automation, AI and ML to ensure security keeps pace
    2. How to build a unified security architecture
    3. How to remove silos and share threat intel across tools
  • Federal Agencies: A Risk Based Approach to Insider Threat Detection Recorded: Nov 3 2020 42 mins
    Kevin Jermyn, Federal Customer Success Manager
    Malicious insiders have been and continue to be a major threat to the United States government. Regardless of motivation, when an insider decides to go rogue they can cause severe damage to an agency and, in some cases, even adversely impact the state of national security.

    We highlight how:
    •U.S. Federal Government agencies can put in place effective countermeasures to combat insider threats
    •Provide granular level access to critical systems and applications
    •Effectively manage and monitor all privileged access activity through CaC authentication and PKI compliance
  • Innovation in Government: Fighting Cyber Threats with Identity Management Recorded: Nov 2 2020 53 mins
    Government Cyber Leaders
    At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.
  • Zero Trust: Identity Security Recorded: Nov 2 2020 42 mins
    Kevin Jermyn, Federal Customer Success Manager
    Today’s IT environments must be able to balance strong security principles while ensuring operational efficiencies. Learn how CyberArk fits into a Zero Trust architecture and allows for significant risk reduction and security for both human and non-person entities (RPA, DevSecOps, etc). Leverage privilege identities remotely in a secure, VPN-less, user friendly workflow to ensure security no matter where access is needed from.
  • Top Attack Paths in the Cloud Recorded: Oct 29 2020 46 mins
    Brandon Traffanstedt, Global Solutions Engineer Director
    Security pros detail the common ways bad actors attack your cloud environments
    As organizations just like yours transition to cloud environments, so do the cyber criminals. An inherent lack of visibility across cloud environments and workloads is masking security threats, undermining compliance and governance and compromising the value of cloud adoption. Individual cloud vendors, point security solutions and siloed teams address just one piece of the puzzle, increasing the risk of misconfigurations and inhibiting the ability to prioritize the most serious threats.
    It can be overwhelming for security teams when organizations rush headfirst into the cloud without consulting them, putting data and processes at risk.
    To effectively mitigate risk, you need to know what bad actors are after. This webinar will guide you through the main compromise points and attacks paths in the cloud.
    You will understand:
    •How attack paths in the cloud are different from the ones typical for on-premises infrastructure and resources
    •The danger of privileged credentials compromise in the cloud
    •Understand 3 to 4 of the most common Cloud attack paths and potential mitigation tactics and tools
    •The role of cloud identities and permissions in the overall cloud security posture

    Join this webinar and learn how to combat bad actors in the cloud. Bring your questions and concern, we will have a live Q&A session with the CyberArk security pro!
  • Four Key Recommendations for Securing Remote Work Recorded: Oct 27 2020 44 mins
    Corey Williams, Head of Identity Marketing at CyberArk
    Remote work is quickly becoming the permanent “new normal”, and attackers have stepped their efforts to take advantage of the situation. They know a dramatic shift in work has resulted in an innumerable number of holes even in carefully crafted security programs.

    Join us for a discussion on key recommendations for securing remote work in the face of this new — and at least partially permanent — normal. We will discuss how to secure:

    • remote workforce access to on-prem and cloud apps
    • users access to their PC and Mac endpoints
    • local admin accounts to thwart malware and ransomware attacks
    • remote access to on-premises systems and resources by 3rd party vendors
  • Best of IMPACT Series: A Customer's Journey Through Privileged Access Management Recorded: Oct 6 2020 24 mins
    Gerry Owens, CEO and Founder GOTAB IT RISK Inc.
    Experience the journey through a Privileged Access Management (PAM) program, as it enables business capabilities, drives efficiencies and reduces risk. Attend this session if you are an IAM leader or an executive interested in understanding how PAM can positively impact your organization, complement your enterprise risk framework, and align to your overall cybersecurity strategy. Gain insights into PAM experiences through the eyes of a consumer.
  • Best of IMPACT LIVE series: PAM 101: Learn the Basics Recorded: Sep 29 2020 28 mins
    CyberArk
    Why is privileged access so important? Why are attackers inside and outside the enterprise zeroing in on privileged accounts? What can you do to protect your organization? These are the questions that we will be addressing in this introduction to privileged access management session. Understand the basics to better mitigate the risk of malicious insiders or external attackers from gaining access to the heart of the enterprise; and learn the foundational elements within the CyberArk solution to address this challenge.
  • Best of IMPACT LIVE Series: Security is a Team Game Recorded: Sep 25 2020 14 mins
    Adam Bosnian EVP, Global Business Development
    CyberArk is featuring the best sessions from the annual event, IMPACT LIVE. The annual CyberArk Impact event that you know and love has been reimagined and delivered in a virtual environment that you can enjoy live from your laptop, anywhere in the world!

    In this session join Adam Bosnian EVP, Global Business Development talks about how CyberArk approaches security as a team game.
  • 5 Cloud Security Considerations for CISOs Recorded: Sep 24 2020 44 mins
    Adam Bosnian, EVP Global Business Development, CyberArk
    Skyrocketing cloud adoption, fast-tracked digital transformation initiatives, geographically dispersed and mobile workforces have created a perfect storm for cyberattacks.

    Their target has remained the same, privileged credentials with access and permissions to an organization’s most critical systems and data. In this new reality, traditional network security boundaries have all but disappeared and digital defenses have shifted from network security to identity security. Now, any identity can become privileged under certain conditions, underscoring the need to secure privileged access everywhere it exists.

    Join us as we discuss:
    -The impact of 68% of CIOs doubling down on cloud services in COVID-19’s wake
    -Growth of cloud user, application and machine identities that require powerful privileges
    -Challenges your organization faces in managing cloud access and identities
    -Five critical questions to ask yourself today to help meet cloud identity challenges tomorrow
  • Better Together: Prioritizing PAM and IDaaS for Cloud Security Recorded: Sep 23 2020 48 mins
    Corey Williams, Head of Identity Security Marketing
    The cloud ushers in a lot of change. Gone are the days of traditional network security boundaries. Identity is the new perimeter in the cloud, but how do we secure it?
    Like peanut butter & jelly, tomato & basil, and salt & pepper, PAM and IDaaS are two great solutions that work great together to secure cloud infrastructure.

    Join us as we discuss:
    o New dynamics of cloud environments and what this means for security
    o Key stakeholders needed in cloud security to ensure a collaborative cross functional approach
    o Securing the entire cloud with consistent controls for:
    o Cloud Management Consoles and CLIs
    o Cloud IaaS
    o Cloud Native Apps (PaaS and FaaS)
    o SaaS Apps
    o Cloud Permissions and Entitlements
    o The importance of JIT and automation in the cloud
CyberArk the leader in Privilege Access Management
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Four Key Recommendations for Securing Remote Work
  • Live at: Oct 27 2020 4:00 pm
  • Presented by: Corey Williams, Head of Identity Marketing at CyberArk
  • From:
Your email has been sent.
or close