InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

CyberArk Identity Security Trailblazers | Driving Operational Technology Safely

Presented by

Christian Goetz, Oliver Shiller

About this talk

The manufacturing industry is rapidly evolving, and operational technology (OT) environments are at the core of innovation, production, and efficiency – all to drive key business initiatives. At CyberArk, we understand that digitizing traditional processes might feel like a daunting task. A weak identity security posture and unauthorized access to privileged accounts in OT systems can lead to production halts, safety risks, and financial loss. This emphasizes the necessity of securing every identity, both human and machine, with the right level of privilege and controls. CyberArk’s redefined Privileged Access Management (PAM) program easily safeguards your critical systems, identities, and operations. Christian Goetz, CyberArk’s Director, PreSales Success and Oliver Schiller, Customer Success at CyberArk, and former Mercedes-Benz Manufacturing, share insights, trends, and use cases around manufacturers looking to improve their identity security posture while mitigating risk. Hear from Todd Bopell, Chief Operating Officer at the National Association of Manufacturers (NAM) as he shares the manufacturing industry's perspective on smart factories, digital production, and the need for cybersecurity. Learn how to protect sensitive operations from external threats and insider vulnerabilities when armed with: -The unique cybersecurity needs of OT environments -The evolving role of PAM vs. traditional IT security measures -Best practices for implementing PAM, including role-based access control, session monitoring, and just-in-time access -Future trends in cybersecurity for manufacturing
CyberArk

CyberArk

44226 subscribers208 talks
Don’t just manage identities. Secure them.
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.
Related topics