Hi [[ session.user.profile.firstName ]]

Preventing the Big One: Staying Ahead of the Breach

Over 37 billion records were exposed in breach events in 2020 - by far the most records exposed in a single year, according to a recent report by Risk Based Security. How has remote working impacted your organization's security posture? What lessons can security professionals learn from the recent wave of breaches and what steps can enterprises take to strengthen security in 2021?

This keynote panel of security experts and industry leaders will explore the best practices for breach prevention, as well as share real-life lessons from the frontlines on what works and doesn't work.

Viewers will learn more about:
- The reality of data breaches
- Why data breach severity is rising
- Ransomware attacks on the rise (doubling from 2019 to 2020) and the threat to businesses
- Technologies that help with breach prevention, detection and response
- Why security awareness matters and best practices for educating employees to be cyber secure

Moderated by:
Michelle Drolet, CEO, Towerwall
Nico Fischbach, Global CTO, Forcepoint
Micheal Meyer, Chief Risk and Innovation Officer, MRSBPO
Andy Thompson, Research Evangelist, CyberArk
Satya Gupta, CTO & Founder, Virsec
Recorded May 11 2021 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michelle Drolet, Towerwall| Andy Thompson, CyberArk| Nico Fischbach, Forcepoint| Satya Gupta, Virsec| Micheal Meyer, MRSBPO
Presentation preview: Preventing the Big One: Staying Ahead of the Breach

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Standardize Identity Security: From On-Prem to Multi-Cloud Nov 16 2021 5:00 pm UTC 60 mins
    David Higgins, EMEA Technical Director, and Chris Maroun, Senior Director, Global Technology Office, CyberArk
    Modern organizations face an exponentially complex identity landscape – cloud migrations, remote work, and rapidly evolving security and compliance philosophies are creating a proliferation of identities across on-premises and multi-cloud environments.

    Standardization is the key to security at scale. By unifying Identity Security controls across siloed environments and risk boundaries, organizations can establish equally dynamic security processes that scale and continuously improve to meet the complex needs of their end users.

    Join the Directors of CyberArk’s Global Technology Office, David Higgins and Chris Maroun, for a discussion on establishing consistent controls at enterprise scale.

    Key topics will include:

    ● Reducing risk of data loss and leakage
    ● Standardizing and securing access for all hybrid and multi-cloud identities
    ● Least privilege access and Just-in-Time workflows
    ● Simplifying secrets management and secure application development
    ● Monitoring and auditing cloud operations.
  • Creating a Roadmap for Identity Security Success Oct 26 2021 2:00 pm UTC 18 mins
    Chantal Westhuis-Jongeneel - Customer Success at CyberArk
    Discover the CyberArk Blueprint - a vendor-agnostic framework to help you assess your current strategy and define a roadmap for Identity Security success.

    In the face of modern cyber threats, digital identity has become the new security battleground, driving the awareness of an “assume breach” mentality and the principles of Zero Trust beyond IT departments. Any identity – whether customer, remote worker, third-party vendor, device, or application – can become privileged under certain conditions, creating an attack path to your most valuable assets. While you may feel some relief that security responsibility has spread far beyond the walls of IT, across lines of business and into the board room, you may be searching for ways to strengthen your message for non-technical business decision-makers. This Virtual Event will help you do just that!
  • Best Practices for a Zero Trust Approach to Cybersecurity Recorded: Oct 21 2021 60 mins
    Jeremy Newberry, Cybersecurity Architect, Merlin Cyber and Gram Slingbaum, Federal Sales Engineer, CyberArk
    Old-school perimeter-based security relies on separating the "bad guys" from the "good guys." Zero Trust assumes that the bad guys are already in your network and have access to your applications and systems. Zero Trust works on the principle "never trust, always verify.”

    Join us to learn best practices on how organizations will continue implementing Zero Trust architectures. While Zero Trust is a strong approach to addressing modern cybersecurity threats, you will need technology, process, and people to implement necessary controls. You need to secure devices and identities without disrupting everyday operations. In this webinar we will share how to:

    Verify every user. Strong, context-aware, multi-factor authentication mitigates the risk of stolen passwords.
    Validate every device. Only allow registered devices with good security posture to access resources.
    Leave no endpoint unprotected. Keep your endpoints secure - from servers to workstations to remote devices.
  • FCW Agency Spotlight: The GSA Agenda - 2022 and Beyond Recorded: Oct 20 2021 53 mins
    Laura Stanton, Assistant Commissioner, GSA and Gram Slingbaum, Federal Solutions Engineer, CyberArk
    The General Services Administration is a hub for governmentwide IT modernization and acquisition, with best-in-class contract vehicles, in-house tech expertise, a leading role on cloud security and a wide range of digital shared services. GSA’s internal innovations also hold valuable lessons for IT leaders at any government agency.

    In this Agency Spotlight webcast, FCW will explore GSA’s tech-related priorities for FY2020, its plans for improving IT acquisition and the services other agencies can leverage for their own modernization efforts.
  • Achieve Zero Trust with CyberArk Identity Security Recorded: Oct 19 2021 17 mins
    Stas Neyman - Director, Product Marketing at CyberArk
    Understand the key elements of Zero Trust and how Identity Security provides the controls you need to implement a Zero Trust model.

    In the face of modern cyber threats, digital identity has become the new security battleground, driving the awareness of an “assume breach” mentality and the principles of Zero Trust beyond IT departments. Any identity – whether customer, remote worker, third-party vendor, device, or application – can become privileged under certain conditions, creating an attack path to your most valuable assets. While you may feel some relief that security responsibility has spread far beyond the walls of IT, across lines of business and into the board room, you may be searching for ways to strengthen your message for non-technical business decision-makers. This Virtual Event will help you do just that!
  • What is Identity Security and Why You Need it Now Recorded: Oct 12 2021 15 mins
    Yuval Moss - VP of Identity Security at CyberArk
    While cyber attacks are inevitable, loss is not. Learn how identity security is used to secure individual identities throughout the lifecycle of the enterprise.

    In the face of modern cyber threats, digital identity has become the new security battleground, driving the awareness of an “assume breach” mentality and the principles of Zero Trust beyond IT departments. Any identity – whether customer, remote worker, third-party vendor, device, or application – can become privileged under certain conditions, creating an attack path to your most valuable assets. While you may feel some relief that security responsibility has spread far beyond the walls of IT, across lines of business and into the board room, you may be searching for ways to strengthen your message for non-technical business decision-makers. This Virtual Event will help you do just that!
  • Managing Entitlements for All Identities – Shared and Federated Recorded: Oct 5 2021 54 mins
    Mike Bykat, Senior Solutions Engineer and Sam Flaster, Product Marketing Manager, CyberArk
    Distributed IT environments require unified security controls. As your organization unlocks the operational advantages of cloud-hosted infrastructure and applications, it’s essential that you take a consistent approach to securing the diverse range of identities that need access to sensitive resources.

    Everyone from CISA to AWS, Azure and GCP stress the importance of least privilege access. But in today’s increasingly complex IT landscape, consistent least privilege is easier said than done.

    Join CyberArk Solutions Engineers Mike Bykat and Hamza Tariq for a discussion on:

    • Defending against identity-related attacks by right-sizing IAM policies
    • Eliminating Identity Security siloes with consistent controls for shared and federated identities
    • The operational promise of emerging technologies like Cloud Infrastructure Entitlements Management (CIEM)
    • Enabling safe, rapid cloud expansion with unified Identity Security
  • Least Privilege Throughout the Cloud Migration Cycle Recorded: Sep 29 2021 43 mins
    Chris Maroun-Sr. Director, Global Technology Office
    Digital transformation doesn’t stop. Whether your organizations are just beginning the cloud migration or operate complex, multi-cloud environments, they need guidance and solutions to protect against the leading cause of breaches — compromised identities and credentials. Join CyberArk for this webinar on how the principle of least privilege access can mitigate risks of cloud Identity and Access Management misconfigurations. We will feature partnership strategies and a demo of CyberArk Cloud Entitlements Manager, a serverless, AI-powered solution that implements least privilege in the cloud. Cloud Entitlements Manager enables organizations at all stages of cloud maturity to securely and confidently expand their cloud footprint. Attendees will gain insights on: · Real-world examples of over-permissioning in cloud environments · Tactical steps to prevent data breaches by remediating excessive cloud IAM permissions · Structuring a plan to help your organizations continuously verify least privilege to meet regulatory and industry compliance objectives · Developing strategic relationships that span the length of your organization’s cloud migrations
  • Least Privilege as Code: Standardizing Management of Cloud Entitlements Recorded: Aug 4 2021 50 mins
    Adam Markert, Principal Solutions Architect, CyberArk
    Security at scale requires consistent controls.

    Cloud security and operations teams must be careful to consistently define processes for provisioning, reviewing, and removing IAM permissions. Otherwise, accelerating cloud adoption can lead to permissions sprawl and excessive access that can be manipulated by attackers.

    The tried-and-true principle of least privilege access – in which all identities have the minimum necessary permissions to function – can help. But without automated, efficient processes to map and manage permissions at scale, least privilege can be easier said than done.

    Join CyberArk Principal Solutions Engineer Adam Markert for a breakdown of:
    -Recent growth in the landscape of possible permissions across AWS, Azure and GCP
    -Least privilege access – what it is and how to get there in the cloud
    -IAM best practices from governments, compliance frameworks and cloud providers
    -Strategies for building scalable, consistent controls and automation workflows to review and remove risky access
  • Securing DevOps 101 Recorded: Jul 28 2021 32 mins
    Jed Knopf, DevOps Solutions Engineer, CyberArk
    "Shift Left" with security into development workflows
  • State of Cloud Security: How do we get to Consistent Least Privilege? Recorded: Jul 27 2021 38 mins
    Brandon Traffanstedt, Identity Security Solutions Strategy & Chris Maroun, Identity Security Solutions Strategy
    IAM is a foundational cloud security control. For years, AWS, Azure and GCP have stressed that
    least privilege access for all human and machine identities is a security best practice.

    Yet as Cloud Providers introduce new features and companies adopt more than one Cloud Provider, proper oversight of access to critical infrastructure and workloads grows more challenging. Recent breaches have made it clear even world-class security organizations can struggle with least privilege.

    So what do organizations need to know as they look to address the visibility and configuration
    challenges of traditional cloud IAM tools?

    Join Brandon Traffanstedt and Chris Maroun, Senior Directors from CyberArk’s Global Technology Office, as they explore the state of cloud security and discuss:

    • Lessons from recent breaches involving excessive permissions
    • Identifying and mapping risky, misconfigured and unused entitlements for all cloud entities
    • Right-sizing IAM policies to defend against external and insider threats
    • When to stick with cloud native IAM and when to turn to third party tools
    • Structuring a holistic, multi-level security plan that includes implementing and maintaining
    least privilege
  • Ransomware Exposed: Key Learnings from Examining 3 Million Samples Recorded: Jul 15 2021 43 mins
    Andy Thompson, Research Evangelist, CyberArk Labs & Brandon Traffanstedt, Senior Director, Global Technology Office
    The first step in the fight against ransomware is to expose it – to explore the different strains, what they have in common and what it is that makes them unique. The team at CyberArk Labs analyzes 100s of new ransomware samples each day and in this webinar, Andy Thompson and Brandon Traffanstedt will disclose their findings of evaluating more than 3 million samples to-date.

    Here’s what is covered:

    - The surge and types of ransomware prevalent during the COVID-19 pandemic
    - How ransomware has evolved over the years to become such a formidable threat, including the role of Bitcoin
    - The kill-chain and path to encryption of today’s modern, dynamic ransomware
    - A review of mitigation strategies and recommendations
  • Remote and Hybrid Workplace Endpoint Security Recorded: Jul 13 2021 51 mins
    Masha Sedova, Elevate Security | Ian Goodhart, Maryland Department of Information Technology | Matt Balderstone, CyberArk
    Endpoint security remains a major challenge for organizations, and in November 2020, Cybersecurity Ventures predicted that global cybercrime costs will reach $10.5 trillion USD a year by 2025. That’s more than triple the amount that it was in 2015. With remote working still very much the norm, and hybrid workforces emerging, it is becoming increasingly difficult to keep track of multiple endpoints and the risk they carry.

    With the threatscape continuing to evolve and cyber attacks becoming even more sophisticated, experts are here to share how security leaders can take the complication out of endpoint security.

    Join us to learn:
    - Common endpoint threats from the first half of 2021
    - Emerging endpoint threats and what to prepare for going forward
    - Leading endpoint protection strategies and how they can be integrated into your existing security solutions
    - And more

    Moderator: Masha Sedova, Co-Founder & President, Elevate Security
    Panelists: Ian Goodhart, Director of Security Operations, Maryland Department of Information Technology (DoIT)
    Matt Balderstone, Cybersecurity Advisor, CyberArk
  • Zero Trust in a Post-COVID World Recorded: Jun 29 2021 53 mins
    Corey Williams and Todd Moseley
    Even as the pandemic eases, the changes it has wrought will last. Your people, employees, faculty, staff, and students won't be 100% back on-site. Identity is your new perimeter.

    Old-school perimeter-based security relies on separating the "bad guys" from the "good guys". Zero Trust assumes that the bad guys are already in your network and have access to your applications and systems. Zero Trust works on the principle "never trust, always verify".

    Join this webinar to learn best practices on how organizations will continue implementing Zero Trust architectures in the nearing "post-COVID" world. While Zero Trust is a strong approach to addressing modern cybersecurity threats, you will need technology, process, and people to implement necessary controls. You need to secure devices and identities without disrupting everyday operations.

    In this webinar, CyberArk will share how to:
    • Verify every user. Strong, context-aware, multi-factor authentication mitigates the risk of stolen passwords.
    • Validate every device. Only allow registered devices with good security posture to access resources.
    • Leave no endpoint unprotected. Keep your endpoints secure - from servers to workstations to remote devices.
  • Why integrating PAM and IAM is essential to your Identity Security strategy Recorded: Jun 29 2021 40 mins
    Khizar Sultan Sr. Director of Access Solution Strategy, CyberArk
    While several years ago only small groups of users (mostly IT admins) were considered privileged, in today’s enterprises, any identity – whether employee, remote worker, third-party vendor, device or application – can become privileged under certain conditions, creating an attack path to an organization’s most valuable assets. This means that companies must be able to secure every type of identity at any stage of the identity lifecycle to protect themselves from cyberthreats.

    While Privileged Access Management (PAM) and Identity Access Management (IAM) solutions independently address specific identity-related threats, only fully-integrated solutions can provide end-to-end identity security and visibility needed by enterprises today. Integrated PAM and IAM solutions can accurately authenticate identities, grant proper permissions, and authorize access to all types of protected resources in a structured manner – all in a way that can be monitored and audited.

    In this webinar learn how CyberArk’s integrated PAM and IAM solution can help you to:

    - Manage the lifecycle of the workforce and privileged identities across the organization
    - Control access to business applications and infrastructure
    - Provide VPN-less and passwordless remote access to cloud and on-premise resources
    - Enable users to elevate their workstation privileges with strong authentication
    - Protect high-risk web application sessions with continuous authentication and auditing
  • Least Privilege as Code: Standardizing Management of Cloud Entitlements Recorded: Jun 28 2021 50 mins
    Adam Markert, Principal Solutions Architect, CyberArk
    Security at scale requires consistent controls.

    Cloud security and operations teams must be careful to consistently define processes for provisioning, reviewing, and removing IAM permissions. Otherwise, accelerating cloud adoption can lead to permissions sprawl and excessive access that can be manipulated by attackers.

    The tried-and-true principle of least privilege access – in which all identities have the minimum necessary permissions to function – can help. But without automated, efficient processes to map and manage permissions at scale, least privilege can be easier said than done.

    Join CyberArk Principal Solutions Engineer Adam Markert for a breakdown of:
    -Recent growth in the landscape of possible permissions across AWS, Azure and GCP
    -Least privilege access – what it is and how to get there in the cloud
    -IAM best practices from governments, compliance frameworks and cloud providers
    -Strategies for building scalable, consistent controls and automation workflows to review and remove risky access
  • Securing DevOps 101 Recorded: Jun 25 2021 32 mins
    Jed Knopf, DevOps Solutions Engineer, CyberArk
    "Shift Left" with security into development workflows
  • Proactive Prevention Starts By Assuming-Breach Recorded: May 11 2021 48 mins
    Brandon Traffanstedt, Sr. Director at CyberArk
    Proactive Prevention Starts By Assuming-Breach: Securing Powerful Access From Dynamic Threats

    Today’s cyber security strategy must secure access at all layers of the environment: from remote endpoints and devices to core databases and servers deep in the datacenter – whether located on prem, in the cloud, or both.

    Dynamic, increasingly complex environments present rich hunting grounds for bad actors and cyber criminals. Coupled with the proliferation of systems accessed by automated, machine-to-machine applications, bots, and cloud-based components like containers – the concern is immediate.

    From new types of ransomware to advanced supply chain attacks – as cyberattacks become ever-more sophisticated, how do you secure your organization?

    Join this session to start thinking like an attacker as we review how to adopt an “Assume-Breach” mindset to prevent attackers from circumventing access controls to penetrate and propagate within your environments. Through a Defense-in-Depth approach to security, Brandon Traffanstedt, Sr. Director at CyberArk, will explore how you can implement policies and controls that detect and isolate adversaries before they traverse your network and inflict serious damage.
  • Preventing the Big One: Staying Ahead of the Breach Recorded: May 11 2021 54 mins
    Michelle Drolet, Towerwall| Andy Thompson, CyberArk| Nico Fischbach, Forcepoint| Satya Gupta, Virsec| Micheal Meyer, MRSBPO
    Over 37 billion records were exposed in breach events in 2020 - by far the most records exposed in a single year, according to a recent report by Risk Based Security. How has remote working impacted your organization's security posture? What lessons can security professionals learn from the recent wave of breaches and what steps can enterprises take to strengthen security in 2021?

    This keynote panel of security experts and industry leaders will explore the best practices for breach prevention, as well as share real-life lessons from the frontlines on what works and doesn't work.

    Viewers will learn more about:
    - The reality of data breaches
    - Why data breach severity is rising
    - Ransomware attacks on the rise (doubling from 2019 to 2020) and the threat to businesses
    - Technologies that help with breach prevention, detection and response
    - Why security awareness matters and best practices for educating employees to be cyber secure

    Moderated by:
    Michelle Drolet, CEO, Towerwall
    Nico Fischbach, Global CTO, Forcepoint
    Micheal Meyer, Chief Risk and Innovation Officer, MRSBPO
    Andy Thompson, Research Evangelist, CyberArk
    Satya Gupta, CTO & Founder, Virsec
  • The Future of Access Management Recorded: Apr 27 2021 46 mins
    Stas Neyman, Director of Product Marketing and Khizar Sultan, Sr Director of Access Solution Strategy
    Access management is an essential component of the Zero Trust security model and a central pillar of the enterprise technology portfolio. CIOs and CISOs use Access Management solutions to protect companies from security breaches, while business leaders leverage AM technologies to enhance productivity, improve operational efficiency, and enable new business initiatives. However, as IT and business environments change, Access Management capabilities must evolve to address the new challenges and threats.

    Join us to learn about the emerging trends in the Access Management space, see how AM can secure hybrid IT environments, and get a sneak peek at the next generation of CyberArk’s AM capabilities.

    After attending the webinar, you will be able to:

    -Understand how changes in IT environments and business drivers are shaping Access Management space
    -Determine which security-focused capabilities are becoming increasingly important
    -Evaluate CyberArk Identity against legacy and modern IAM solutions
    -Gain insight into the next generation of CyberArk’s Access Management capabilities
CyberArk the leader in Privilege Access Management
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Preventing the Big One: Staying Ahead of the Breach
  • Live at: May 11 2021 3:00 pm
  • Presented by: Michelle Drolet, Towerwall| Andy Thompson, CyberArk| Nico Fischbach, Forcepoint| Satya Gupta, Virsec| Micheal Meyer, MRSBPO
  • From:
Your email has been sent.
or close