Hi [[ session.user.profile.firstName ]]

Transforming Security with Identity and Access Management

Have you ever wondered how other organizations are using CyberArk Identity to optimize their operations? What have they successfully implemented to secure their users and resources? In what ways has CyberArk enabled their digital business? Join our roundtable discussion to hear customers share their journey with CyberArk, unique use cases they are solving and lessons learned.
Recorded Jul 15 2021 19 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Moderated by Gil Rappaport, General Manager of Identity and Access
Presentation preview: Transforming Security with Identity and Access Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Unify your IT and HR Workflows with CyberArk Identity Oct 5 2021 3:00 pm UTC 26 mins
    Lee Godby, Eddie Welch & Jerry Waldorf
    The convergence of automation and Identity Security is rapidly gaining momentum. HR is leading the charge, requiring IT to leverage HR systems as the "source of truth" to create new users and identities as part of the employee onboarding process. CyberArk Identity automates HR-based workflows with our Lifecycle Management service by integrating with leading Human Capital Management (HCM) organizations such as BambooHR, SAP, UKG and Workday.
  • A Journey Through the Mind of a Hacker Oct 1 2021 10:00 am UTC 24 mins
    Assaf Sion & Emmanuel, CyberArk Labs
    Recent attacks have demonstrated attackers' growing creativity, confidence and precision. But have you ever wondered how they go about finding new flaws? We'll review several significant vulnerabilities in technical detail, analyzing each of them from an attacker's perspective. You'll gain insights on tactics, techniques and procedures (TTPs) used to pinpoint areas of weakness.
  • EPM - More Than Just Least Privilege Sep 28 2021 10:00 am UTC 15 mins
    Matt Tarr, Solutions Architect
    Phishing, ransomware and other endpoint attacks can disrupt your business, damage your company's reputation and lead to steep regulatory fines and costly lawsuits. To stop attackers in their tracks, consistent least privilege enforcement is key. CyberArk Endpoint Privilege Manager gives you the tools and techniques to get there quickly and confidently - but it doesn't stop there! Explore the first critical stage of controlling privilege on the endpoint, as well as CyberArk capabilities that enable continued expansion of your endpoint security program.
  • How to Stay One Step Ahead in an Assume-Breach World Sep 24 2021 10:00 am UTC 20 mins
    Andy Thompson, CyberArk Research Labs Evangelist
    Traditional perimeter-based IT security models are ill-suited for today's world of cloud services and mobile users. Savvy attackers can breach enterprise networks and fly under the radar for weeks or even months. Threat actors always find new and innovative ways to penetrate networks, steal data and disrupt business. It's not a question of if - but when. It's time to adopt an "assume-breach" mindset to help detect and isolate adversaries before they traverse your network and inflict serious damage...
  • CyberArk Identity - An Essential Component of your Zero Trust Security Model Recorded: Sep 21 2021 29 mins
    Vishnu Varma
    Forward-looking organizations adopt the Zero Trust approach to security to address the challenges of hybrid IT infrastructures, on-the-go employees and cloud-delivered services. A Zero Trust security model eliminates the concept of the static network-based perimeter and treats every actor and vector inside and outside the network as a potential threat. CyberArk Identity applies this methodology to securely enable access for various users - employees, partners and customers - regardless of their location, device or network for various assets and resources. We'll explore the key Zero Trust concepts, explain stages of Zero Trust maturity and provide examples of how CyberArk Identity can help you on your own Zero Trust journey.
  • Stop Ransomware Before It Stops You with a Defense in Depth Approach Recorded: Sep 17 2021 18 mins
    Bryan Murphy, Andy Horwitz & DJ Long
    Whether opportunistic or targeted, ransomware attacks start on the endpoint. Inadequately protected desktops, laptops and servers are pervasive - and each one provides a potential entry point for attackers to steal and encrypt data. A defense-in-depth approach is critical for strong ransomware protection, achieved by layering a variety of security controls to eliminate gaps, reduce exposure and strengthen overall security posture. Experts from Proofpoint, Crowdstrike and CyberArk will outline best practices for adopting a defense-in-depth across people, process and technology.
  • Transforming Security with Identity and Access Management Recorded: Sep 14 2021 19 mins
    Moderated by Gil Rappaport, General Manager of Identity and Access
    Have you ever wondered how other organizations are using CyberArk Identity to optimize their operations? What have they successfully implemented to secure their users and resources? In what ways has CyberArk enabled their digital business? Join our roundtable discussion to hear customers share their journey with CyberArk, unique use cases they are solving and lessons learned.
  • Red Team Presents: Bypassing MFA - the Good, the Bad and the Ugly Recorded: Sep 10 2021 18 mins
    Shay Nahari, Vice President of CyberArk Red Team Services
    Multi-Factor Authentication (MFA) is rightfully considered a strong technical control for protecting against credential theft. Yet this Zero Trust building block is also susceptible to weak points. When implemented incorrectly, it can become compromised and used in the attack chain. In this session, the CyberArk Red Team will demonstrate several attacks performed against MFA during real adversarial simulation engagements last year.
  • What is Identity Security and Why You Need It Now! Recorded: Sep 7 2021 17 mins
    Yuval Moss
    As digital transformation has opened new doors for business, it has also left the door wide open for attackers. With physical and network barriers dissolved, any identity can be an attack path to an organization's most valuable assets. While cyber attacks are inevitable, loss is not. This session outlines how Identity Security is used to secure individual identities throughout the cycle of accessing critical assets. Identity Security Achieves a Zero Trust approach to secure the rapidly expanding number and types of identities within business applications, across cloud workloads and throughout the DevOps pipeline.
  • Remote and Hybrid Workplace Endpoint Security Recorded: Sep 2 2021 52 mins
    Masha Sedova, Elevate Security | Ian Goodhart, Maryland Department of Information Technology | Matt Balderstone, CyberArk
    Endpoint security remains a major challenge for organizations, and in November 2020, Cybersecurity Ventures predicted that global cybercrime costs will reach $10.5 trillion USD a year by 2025. That’s more than triple the amount that it was in 2015. With remote working still very much the norm, and hybrid workforces emerging, it is becoming increasingly difficult to keep track of multiple endpoints and the risk they carry.

    With the threatscape continuing to evolve and cyber attacks becoming even more sophisticated, experts are here to share how security leaders can take the complication out of endpoint security.

    Join us for a replay of our panel discussion to learn:
    - Common endpoint threats from the first half of 2021
    - Emerging endpoint threats and what to prepare for going forward
    - Leading endpoint protection strategies and how they can be integrated into your existing security solutions
    - And more

    Moderator: Masha Sedova, Co-Founder & President, Elevate Security
    Panelists: Ian Goodhart, Director of Security Operations, Maryland Department of Information Technology (DoIT)
    Matt Balderstone, Cybersecurity Advisor, CyberArk
  • Why integrating PAM and IAM is essential to your Identity Security Strategy Recorded: Aug 26 2021 40 mins
    Khizar Sultan, Sr. Director of Access Solution Strategy
    Learn how CyberArk’s integrated PAM and IAM solution can help you to:

    Manage the lifecycle of the workforce and privileged identities across the organization
    Control access to business applications and infrastructure
    Provide VPN-less and passwordless remote access to cloud and on-premise resources
    Enable users to elevate their workstation privileges with strong authentication
    Protect high-risk web application sessions with continuous authentication and auditing
  • Ransomware Exposed: Key Learnings from Examining 3 Million Samples Recorded: Jul 22 2021 43 mins
    Andy Thomson, Global Research Advisor @ CyberArk Labs; Brandon "BT" Traffanstedt, Sr. Director, Global Technology Office
    Ransomware is widely known to be one of the most pervasive and dangerous cyberthreats. Even though it has been around since 1989 it’s managed to become the fastest growing type of cybercrime during the COVID-19 pandemic.

    Research firm Cybersecurity Ventures predicts that the global annual damage costs of ransomware to businesses will top $20 billion in 2021. Dynamic ransomware attacks can quickly spread throughout a company, impairing user productivity and disrupting business.

    The first step in the fight against ransomware is to expose it – to explore the different strains, what they have in common and what it is that makes them unique. The team at CyberArk Labs analyzes 100s of new ransomware samples each day and in this webinar, Andy Thompson and Brandon Traffanstedt disclose their findings of evaluating more than 3 million samples to-date.

    Join us as we discuss
    - The surge and types of ransomware prevalent during the COVID-19 pandemic
    - How ransomware has evolved over the years to become such a formidable threat, including the role of Bitcoin
    - The kill-chain and path to encryption of today’s modern, dynamic ransomware
    - A review of mitigation strategies and recommendations
  • Integrating PAM and IAM into your Identity Security Strategy - Session 2 of 2 Recorded: Jul 8 2021 40 mins
    Khizar Sultan, Sr. Director of Access Solution Strategy
    Learn how CyberArk’s integrated PAM and IAM solution can help you to:

    Manage the lifecycle of the workforce and privileged identities across the organization
    Control access to business applications and infrastructure
    Provide VPN-less and passwordless remote access to cloud and on-premise resources
    Enable users to elevate their workstation privileges with strong authentication
    Protect high-risk web application sessions with continuous authentication and auditing
  • Preventing the Big One: Staying Ahead of the Breach Recorded: Jul 1 2021 54 mins
    Michelle Drolet, Towerwall| Andy Thompson, CyberArk| Nico Fischbach, Forcepoint| Satya Gupta, Virsec| Micheal Meyer, MRSBPO
    Over 37 billion records were exposed in breach events in 2020 - by far the most records exposed in a single year, according to a recent report by Risk Based Security. How has remote working impacted your organization's security posture? What lessons can security professionals learn from the recent wave of breaches and what steps can enterprises take to strengthen security in 2021?

    This keynote panel of security experts and industry leaders will explore the best practices for breach prevention, as well as share real-life lessons from the frontlines on what works and doesn't work.

    Viewers will learn more about:
    - The reality of data breaches
    - Why data breach severity is rising
    - Ransomware attacks on the rise (doubling from 2019 to 2020) and the threat to businesses
    - Technologies that help with breach prevention, detection and response
    - Why security awareness matters and best practices for educating employees to be cyber secure

    Moderated by:
    Michelle Drolet, CEO, Towerwall
    Nico Fischbach, Global CTO, Forcepoint
    Micheal Meyer, Chief Risk and Innovation Officer, MRSBPO
    Andy Thompson, Research Evangelist, CyberArk
    Satya Gupta, CTO & Founder, Virsec
  • The Future of Access Management - Session 1 of 2 Recorded: Jul 1 2021 46 mins
    Stas Neyman, Director of Product Marketing at CyberArk Khizar Sultan, Sr. Director of Access Solution Strategy at CyberArk
    Access Management (AM) is an essential component of cybersecurity and a central pillar of the enterprise technology portfolio. Security leaders, including CIOs and CISOs, deploy Access Management solutions as part of their Zero Trust and defense-in-depth security strategies to defend IT systems against cyberattacks, identity-focused security breaches and data loss. At the same time, business leaders leverage AM technologies to enhance productivity, improve operational efficiency, and enable business initiatives dependent on reliable identity-based access control mechanisms.

    As IT environments evolve, business drivers change and cybercriminals increasingly target identities, Access Management capabilities must advance to address the new challenges and threats. In this webinar, we will help Security and Identity pros understand emerging trends in the Access Management space, demonstrate how AM can secure hybrid IT environments, and preview the next generation of CyberArk’s AM capabilities.
    After attending the webinar, you will be able to:
    • Understand how changes in IT environments and business drivers are shaping Access Management space
    • Determine which security-focused capabilities are becoming increasingly important
    • Evaluate CyberArk Identity against legacy and modern IAM solutions
    • Gain insight into the next generation of CyberArk’s Access Management capabilities
  • Proactive Prevention Starts By Assuming-Breach Recorded: Jun 8 2021 48 mins
    Brandon Traffanstedt, Sr. Director at CyberArk
    Proactive Prevention Starts By Assuming-Breach: Securing Powerful Access From Dynamic Threats

    Today’s cyber security strategy must secure access at all layers of the environment: from remote endpoints and devices to core databases and servers deep in the datacenter – whether located on prem, in the cloud, or both.

    Dynamic, increasingly complex environments present rich hunting grounds for bad actors and cyber criminals. Coupled with the proliferation of systems accessed by automated, machine-to-machine applications, bots, and cloud-based components like containers – the concern is immediate.

    From new types of ransomware to advanced supply chain attacks – as cyberattacks become ever-more sophisticated, how do you secure your organization?

    Join this session to start thinking like an attacker as we review how to adopt an “Assume-Breach” mindset to prevent attackers from circumventing access controls to penetrate and propagate within your environments. Through a Defense-in-Depth approach to security, Brandon Traffanstedt, Sr. Director at CyberArk, will explore how you can implement policies and controls that detect and isolate adversaries before they traverse your network and inflict serious damage.
  • Ransomware: How Privileged Access Management strategy mitigates risks Recorded: May 18 2021 46 mins
    Matthew Scott, Senior Sales Engineer & Massimo Carlotti, Solution Engineer Team Lead for CyberArk
    Ransomware have been making headlines again and again. Ransomware evolve and new ones like Maze are not only encrypting data and damaging business continuity, they also lead to public data leak of  confidential information. Learn how risks associated with the ransomware rise can be mitigated by implementing a comprehensive Privileged Account Management (PAM) strategy.
    CyberArk solution enables to mitigate the risk related to Ransomware by implementing least privilege approach and credential theft protection to prevent on the attack on the machines where it lands, combined with privileged credential rotation and isolation to block lateral movements and prevent the spread of the attack.
    During this webinar, you will discover the PAM programmatic approach that enables organizations to control this threat from end to end. The PAM approach allows you to secure the initial endpoint where attackers can land and prevent credential theft, privilege escalations and lateral movement
  • Protect against the Fundamental Nature of Ransomware Recorded: May 4 2021 57 mins
    David Higgins, EMEA Technical Director at CyberArk
    The Endpoint is more exposed than it ever has been before. As remote working becomes the norm, these devices are now very much outside the perimeter of the office defences. Unfortunately, exploiting the current global crisis, we have seen an increased and focused effort in Ransomware attacks.

    In this session, we review some past approaches to stopping ransomware and the challenges associated with them. Then look at a more holistic approach to securing the endpoint; enforcing security best practices such as Least Privilege and Application Control, and how this can actually protect against the fundamental nature of Ransomware
  • It’s Human to make mistakes – and attackers are banking on it Recorded: Apr 21 2021 29 mins
    Gary Pollock
    Falling victim to a Social Engineering Attack, Accidental Damage caused by excessive permissions and Misconfiguration are all elements of Human Error that Attackers will exploit – and persistently have done so to date.

    In this session we review what approaches could be taken to prevent such mistakes but also, and perhaps more importantly, limit their impact. The last point being – should we assume it is human to make mistakes, and so they will continue to happen – therefore our strategy should initially focus on reducing the impact of such incidents? We therefore will discuss isolating attacks from the initial point of intrusion, controlling user privileges and some methods for reducing and identifying misconfiguration.
  • First steps to regain control on a compromised infrastructure Recorded: Apr 13 2021 47 mins
    Aaron Fletcher, Senior Security Consultant for CyberArk
    Incidents put stress and pressure on the organisation to rapidly respond, reactively and tactically. So the question is, what do you do when this happens? And what could you do to help mitigate the frequency of incidents?

    In this Webinar we will look at a scenario where an organisation comes under attack from a malicious external actor, we will analyse the vector of the attack and we will identify where mitigations can be put in place to reactively respond and where you could proactively defend the organisation.

    - Identifying the type of attack and what did it do?
    - What is the recovery mechanism in place?
    - Measuring the decisions to return to Business as Usual operations
    - Threat Analytics and Discovery for known attacks and Vulnerabilities
CyberArk, leader in Privilege Access Management & Identity Security
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management.
You'll find here live webinars, on demand webinars and videos!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Transforming Security with Identity and Access Management
  • Live at: Jul 15 2021 8:13 pm
  • Presented by: Moderated by Gil Rappaport, General Manager of Identity and Access
  • From:
Your email has been sent.
or close