How to Secure Ansible Automation Environments with CyberArk
Are you looking for an effective way to secure your organization’s Ansible environments? Watch this webinar to learn how you can use CyberArk as a centralized security platform with your Ansible deployments. We review use cases and best practices for comprehensive privileged access, credential and secrets management.
Key points covered in the webinar include:
An overview of common challenges in securing automation environments
The benefits of using CyberArk to enhance Ansible’s native capabilities
Demo of how to use CyberArk to secure Ansible deployments
RecordedApr 14 202057 mins
Your place is confirmed, we'll send you email reminders
Securing the access to cloud data assets has never been more important. According to the latest Verizon DBIR, 73% of cloud breaches involved an email or web application server, while 77% of these cloud breaches also involved breached credentials. What does this mean for enterprise cloud security, especially in the time of COVID19 and remote working?
Join this keynote panel to learn more about:
- How the landscape has changed in 2020
- Why attackers are focused on identities
- Understanding privileged user behavior and securing identities
- Discover how organizations are doing IAM, and what's needed for a more secure enterprise
- Best practices and recommendations by the experts
Corey Williams, Head of Identity Security Marketing, CyberArk
The cloud ushers in a lot of change. Gone are the days of traditional network security boundaries. Identity is the new perimeter in the cloud, but how do we secure it?
Like peanut butter & jelly, tomato & basil, and salt & pepper, PAM and IDaaS are two great solutions that work great together to secure cloud infrastructure. Join us as we discuss:
o New dynamics of cloud environments and what this means for security
o Key stakeholders needed in cloud security to ensure a collaborative cross functional approach
o Securing the entire cloud with consistent controls for:
o Cloud Management Consoles and CLIs
o Cloud IaaS
o Cloud Native Apps (PaaS and FaaS)
o SaaS Apps
Adam Bosnian, EVP Global Business Development, CyberArk
Skyrocketing cloud adoption, fast-tracked digital transformation initiatives, geographically dispersed and mobile workforces have created a perfect storm for cyberattacks.
Their target has remained the same, privileged credentials with access and permissions to an organization’s most critical systems and data. In this new reality, traditional network security boundaries have all but disappeared and digital defenses have shifted from network security to identity security. Now, any identity can become privileged under certain conditions, underscoring the need to secure privileged access everywhere it exists.
Join us as we discuss:
o The impact of 68% of CIOs doubling down on cloud services in COVID-19’s wake
o Growth of cloud user, application and machine identities that require powerful privileges
o Challenges your organization faces in managing cloud access and identities
o Let’s talk access, privileges and permissions: what you can do versus how it is enforced
o Five critical questions to ask yourself today to help meet cloud identity challenges tomorrow
Threat detection and response capabilities regularly used for on-premises environments via the CyberArk Core Privileged Access Security Solution are now also available for use in cloud and hybrid architectures to identify high-risk, privileged access related activities and to mitigate risks associated with advanced attacks.
In this webinar we’ll provide a demo and focus on:
- The importance of incorporating privileged threat analytics, detection and response into both hybrid and cloud environments
- New cloud-specific privileged threat analytic capabilities
- CyberArk’s integration with Amazon Web Services new Security Hub solution
Corey O’Connor, senior product marketing manager for CyberArk
Scott Ward, principal solutions architect for Amazon Web Services
Hila Oved, product manager for CyberArk
Matt Tarr, principle solutions engineer for CyberArk
Same old story. Motivated to cause disruption or by a potential financial gain, attackers follow a tried and true attack path typically starting at the endpoint with phishing. Industry research shows 80% of successful security attacks involve compromised privileged access. In the case of Twitter’s high-profile breach, an insider threat adds another familiar element to the story.
With a dramatic increase of remote workers comes an expanded attack surface. Worker today are distracted while juggling work and family responsibilities, and there is increased stress related to a global pandemic and an uncertain economic future. There is not a better time to review the priorities of your security program to ensure policies and practices reflect new realities.
Questions every security leader asking right now: how are we identifying what our most critical systems, tools, data and infrastructure are and who has access? Who is considered a privileged user (this includes business users) and what steps are we taking to manage, monitor and protect that access?
Join us to learn about security trends and best practices including:
• Reasons identity is the new perimeter
• Isolating access to the administrative system and requiring dual control for highly sensitive operations
• Continuous monitoring and user behavior analysis on applications through a monitored proxy
• Implementing least privilege controls to minimize access to sensitive functionality
The twitter attack highlights the dangers of unsecured privileged access to critical resources and how quickly any credential or identity can become privileged under certain conditions.
Aaron Fletcher, Senior Security Consultant for CyberArk
Incidents put stress and pressure on the organisation to rapidly respond, reactively and tactically. So the question is, what do you do when this happens? And what could you do to help mitigate the frequency of incidents?
In this Webinar we will look at a scenario where an organisation comes under attack from a malicious external actor, we will analyse the vector of the attack and we will identify where mitigations can be put in place to reactively respond and where you could proactively defend the organisation.
- Identifying the type of attack and what did it do?
- What is the recovery mechanism in place?
- Measuring the decisions to return to Business as Usual operations
- Threat Analytics and Discovery for known attacks and Vulnerabilities
Rachel Veal, Ad Hoc | Ido Safruti, PerimeterX | Josh Kirkwood, CyberArk | Max Heinemeyer, Darktrace
Sacrificing data security for faster innovation is one of the main causes of tension between cybersecurity and IT professionals on the one side and DevOps teams on the other. So, how should organizations bridge this divide and what do they need to implement?
Join this exclusive keynote panel to learn more about:
- Why securing DevOps pays off in the long run
- Shifting left: What is it, how it works and why your organization needs it
- How to make security an integral part of the DevOps process
- DevOps security checklist
- Recommendations for tools and workflows that enable better security
Rachel Veal, IT & Security Program Manager, Ad Hoc (moderator)
Ido Safruti, Chief Technology Officer, PerimeterX
Josh Kirkwood, Solution Engineering Manager, CyberArk
Max Heinemeyer, Director of Threat Hunting, Darktrace
Andres Guisado, Principal Solutions Engineer, CyberArk
Security has recently become indispensable in DevOps world and continues the road to maturity. Cloud, containers, agile, pipelines, you name it. DevSecOps is not a hype anymore and it is becoming an increasingly important priority for everyone. Where to start? What are the best practices?
In this session, you will learn:
- Where is DevSecOps coming from?
- Why, What and How DevSecOps?
- Baselines and best practices for a DevSecOps approach
- Why it's important to make sure to protect the last line of defense of your organisation
Protecting the heart of an organization starts exactly there - locking down the systems that are most critical. However, the endpoint remains the initial point of intrusion whereby attackers can compromise devices and establish a beachhead with relative ease.
In this session, we detail how to remove local admin rights and prevent credential theft from developer and IT admin workstations, which are a common target for attackers.
David Higgins, EMEA Technical Director at CyberArk
The Endpoint is more exposed than it ever has been before. As remote working becomes the norm, these devices are now very much outside the perimeter of the office defences. Unfortunately, exploiting the current global crisis, we have seen an increased and focused effort in Ransomware attacks.
In this session, we review some past approaches to stopping ransomware and the challenges associated with them. Then look at a more holistic approach to securing the endpoint; enforcing security best practices such as Least Privilege and Application Control, and how this can actually protect against the fundamental nature of Ransomware
Pasquale Angiuli, Sales Engineer e Jonathan Lo Piparo, Commercial Account Executive
Questa innovativa offerta “PAM as a Service” si basa su oltre 15 anni di leadership di CyberArk nel mercato delle soluzioni PAM, mediante la quale vengono protetti alcuni degli ambienti IT più grandi e critici al mondo. Nel corso di questo webinar, presenteremo il nostro punto di vista ed approccio su come mitigare quello che viene considerato uno dei rischi IT più importanti e condivideremo come Cyberark propone di guidare i clienti al successo del progetto in tempi brevi.
Niels van Bennekom, Sales Engineer and Marcel Bosgra, Senior Sales Engineer at CyberArk
Privileged Access is everywhere. Privileged accounts can be found in every networked device, database, application, and server on-premises and in the cloud. Privileged users have the “keys to the kingdom” and, in the case of a cyberattack or data breach, privileged credentials can be used to cause catastrophic damage to a business.During this session we will demonstrate based on 5 use cases how CyberArk can help you to secure your privileged accounts.The 5 Uses Cases we cover:
How a PAM solution can help you manage all the privileged account within your environment?
How to use unique identifiable accounts without creating personal accounts for all administrators.
How a secure proxy helps you to mitigate a pass-the-hash attack.
How a PAM solution can provide audit logs and session recordings (without the need to install an agent)
How to analyze high-risk Privileged activities in your network
Alistair Anderson, Senior Sales Engineer and Emilio Tonelli, Sales Engineer
Con l'adozione dei processi DevOps e degli ambienti Cloud, la Digital Transformation ha reso gli sviluppatori alcuni tra i piu' "privilegiati" utenti IT nelle organizzazioni.
Gli attaccanti lo sanno e hanno iniziato a prendere di mira proprio gli sviluppatori.
Per mitigare i rischi e proteggere gli ambienti usati dagli sviluppatori, CyberArk offre un approccio completo ed ampio che include anche ambienti di questo tipo senza impatti sulla produttività e l'esperienza d'uso degli utenti.
La gestione dei Secret è infatti un elemento chiave delle pipeline DevOps e costituisce un framework al quale gli sviluppatori possono affidarsi per operare coi Secret in sicurezza.
Julie Mauch, (CISSP) TAM Services Manager- Americas for CyberArk
Many organizations consider people, process and technology when building out a variety of programs that involve change – and this “formula” is often tried and true for security. However, there are many opinions on which element is most important, and the answers may be specific to a particular program or culture.
CyberArk has worked with 1000s of customers over the years. As a result, we have insights on what enables organizations to successfully build a privileged access security program.
In this 30 minute webinar, we’ll review the significance of “people.” Learn about non-technical factors that influence the program success including:
Program maturity and
We’ll also review a sample PAS Program roadmap and share an example of how one bank followed the process.
Bart Bruijnesteijn, Pre-Sales Director at CyberArk
In this Session, you will have the unique opportunity to learn from real-world scenarios related to privileged access security in cloud environments. We provide insights from lessons learned securing commercial SaaS applications, cloud infrastructure and internal apps deployed in the cloud.
Key points covered include:
Quick wins for securing root and privileged access into Cloud Management Consoles
Centralizing human access for other Cloud native tools
Extending password vaulting and rotation to integrated automation and security tools
Automating the discovery and onboarding of Cloud secrets as well as scaling CyberArk in the Cloud
Josh Kirkwood, Solutions Engineer Manager for CyberArk
Every cloud has a privilege lining, and privilege is the first real challenge of building an effective and scalable multi/hybrid cloud strategy moving forward. the management of this privilege is often a pain that is just accepted as companies rush to realise the benefits of a cloud migration. Learn how to make privilege access management an enabling service as you onboard additional cloud providers, understand how you can realise increased operational efficiency and decreased risk all through consistently managing privilege.
Gil Rapaport, head of Alero and Brandon Traffanstedt, Global Director, System Engineering for CyberArk
Organizations today heavily rely on a variety of 3rd party vendors for critical operations and tasks. Most typically, they have a combination of VPNs, agents and ad hoc processes for securely providing remote vendors with access to critical internal systems. These solutions carry a set of difficulties for both users and administrators. There is now a more secure and easier way to provide access.
CyberArk® Alero™ is a new SaaS based solution that combines Zero Trust access, biometric authentication and just-in-time provisioning for remote vendors who need access to critical systems managed by the CyberArk Privileged Access Security Solution.
Join us and learn:
* About the challenges in using VPN-based, agent-based, password-based and other legacy solutions for remote vendor access
* How biometric authentication and just-in-time provisioning can be combined to securely provide and provision access to remote vendor users
* How to simply manage and administer the remote vendors that need access to your critical internal systems
Anastasia Sotelsek, Principal Sales Engineer and Jean-Paul Garcia-Moran, Security Advisor
El Ransomware evoluciona y aquellos como Maze no solo están cifrando datos para irrumpir el negocio, sino que también conducen a la fuga de información confidencial. Aprenda cómo los riesgos asociados al Ransomware pueden mitigarse mediante la implementación de una estrategia integral de gestión de cuentas privilegiadas (PAM). La solución CyberArk permite mitigar el riesgo relacionado con Ransomware mediante un enfoque de privilegios mínimos y protección contra el robo de credenciales para evitar el ataque a las máquinas donde aterriza, combinado con una rotación de credenciales y aislamiento de sesiones privilegiadas para que los atacantes no puedan moverse lateralmente por el entorno y evitar su propagación.
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management.
You'll find here live webinars, on demand webinars and videos!
How to Secure Ansible Automation Environments with CyberArkJoe Garcia, CISSP DevOps Security Engineer at CyberArk & Matt St. Onge, Sr. Solutions Architect ISV Alliances at Red Hat[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]56 mins