Featured
Every User Can Be a Privileged User: Securing Access for High-Risk Workforce Users
Maor Franco, Seth Garlett
Watch this informative session to learn how privilege has shifted in the modern workplace, how today’s threat actors take advantage of this shift and what organizations can do to safeguard their high-risk workforce to better implement a Zero Trust strategy.
All episodes
-
You Have a Password Management Problem. Let's Solve It.
CyberArk
This webinar discusses the pros and cons of different methods of storing, sharing and protecting passwords for business applications. You’ll hear about the best strategies for managing and protecting access to non-SSO-integrated apps, capabilities to look for in password management solutions, and how to evaluate your password management vendors.
-
The Path to Secure HR-Driven Employee Lifecycle Management
CyberArk
The lack of connectivity between HR systems and downstream business applications prevents the automation of key onboarding and offboarding processes. Organizations then rely on manual processes to onboard employees and manage their access and privileges. This webinar reveals better ways to simplify the business processes that surround employee lifecycle management.
-
Better Security with Threat Response Automation
CyberArk
Strong Identity Security requires a multi-layered approach to mitigate risk and proactively protect your resources. The more opportunities to act on suspicious data, the better. In this webinar, learn how to orchestrate threat responses leveraging contextual identity data with CyberArk Identity Flows, a low-code orchestration solution.
-
Anatomy of the MGM Hack: A CyberArk Labs Perspective
Khizar Sultan and Andy Thompson
On September 11 threat actors initiated a social engineering attack that led to the near shutdown of MGM Resorts International. This attack highlights the importance of deploying a wide variety of robust security measures and best practices in an organization’s strategy for protecting identities, especially those that are highly privileged.
CyberArk resident experts, Khizar Sultan and Andy Thompson, examine the root causes and lessons learned from the MGM Resorts attack based on publicly available sources. They also provide insights into properly implementing effective security measures and highlight the consequences of failing to do so. -
From Foundational to Exceptional: Best Practices for Access Management
CyberArk
Security-minded companies know that Access Management (AM) is more than protecting access against breaches. They deploy AM solutions to enable businesses, enhance user experience, and reduce IT overhead. Despite being a standard component of cybersecurity and a central pillar of the enterprise technology portfolio, Access Management programs vary greatly from company to company. Some IT organizations are laying the foundation, while others are well on the way to operational excellence. No matter where your organization is on the Access Management journey, the need to secure and maintain control of identities, as well as defend against modern attacks is always there. This webinar reveals the the best practices to create more secure and sophisticated Access Management programs that defend IT systems against cyberattacks, identity-focused security breaches, and data loss.
-
3 Easy Ways to Automate PAM for a Huge Impact
Laura Balboni, Brandon McCaffrey
Your Privileged Access Management (PAM) program is invaluable in protecting your organization from cyberattacks. You are undoubtedly keeping your business and its most valuable assets more secure by deploying PAM controls to protect critical accounts from compromise. But the pressure is on, and all eyes are on you — the security expert — to keep your program agile and protect against tomorrow’s attacks...often with limited resources. What if you could optimize your PAM processes through automation to free up time and resources, all while tightening security? You may not be aware of the various ways you can make easy adjustments to your PAM program. Watch this webinar to learn ways to do more with less, strengthen zero trust and eliminate manual efforts.
-
Mitigate Your Risk with Six Steps and New CyberArk HAR Tool
Andy Thompson, Khizar Sultan
Okta's support case management system was breached by a threat actor using stolen credentials. Watch as CyberArk resident experts, Khizar Sultan and Andy Thompson, deconstruct the events of this breach and share strategies organizations can take to mitigate the risks of identity attacks using strong security processes and operational procedures.
-
Going Passwordless for Enterprises Key Considerations for Success
Brandon McCaffrey, Yuval Glasner
Watch this webinar to learn about common enterprise scenarios where passwordless authentication can be implemented and ways to approach passwordless adoption, including: transitioning to passwordless authentication, security benefits and considerations for various passwordless methods, real-world examples of customer implementations and what to look for when evaluating passwordless providers.
-
Manage Workforce Passwords Seamlessly Across the Enterprise
Patrik Horemans & Alex Woodrow
We get it, passwords are hard to remember, time consuming to manage and open your company to risk. Yet, even though most modern apps integrate with single sign-on solutions to sidestep password management woes, some apps still require a stand-alone username and password credentials. As a result, employees need a way to access these business apps seamlessly, from any device, at any time. Watch to learn how CyberArk Identity Workforce Password Management solves this challenge by enabling companies to capture, store and manage password-based credentials; securing credentials with multifactor authentication; providing users with frictionless access to business applications.
-
Strengthening Your Security Perimeter to Shut Down Identity-Based Attacks
Jared Brodsky & Seth Garlett
This is session one of the ""The Identity Security Model for Trust"" webinar series. Identity is the ideal security perimeter, but it’s under constant threat. While user identities and access controls defend digital assets, recent security breaches highlight vulnerabilities in the Identity security perimeter.
Watch CyberArk experts as they dissect modern cyber threats, extract valuable lessons and share proactive steps to fortify your organization’s security perimeter. Ideal for security, IT and security-focused professionals, this webinar offers insights to mitigate modern risks and protect your organization against evolving Identity based attacks.
-
Going Beyond the Perimeter: Strategies to Secure Your Workforce and Endpoints
Ana Meneghel, Matt Laufer
As more than 70% of reported security breaches are attributed to identity-based threats, questions arise about the relevance of the perimeter concept in safeguarding workforce identities and endpoints. Today, organizations must embrace a security-first mindset that transcends the traditional perimeter, adopting comprehensive identity and access controls that span the identity lifecycle from login and beyond. Watch this session to explore how to adopt the identity perimeter approach, the inherent risks in using traditional controls and the importance of a holistic IAM strategy in safeguarding workforce identities and endpoints that extend beyond the perimeter.
-
Securing the Modern Workforce: The Power of Intelligent Privilege Controls
Khizar Sultan, Alex Linde
Identity threats are rapidly evolving, rendering traditional access management inadequate. The surge in SaaS applications, cloud use, and remote work has made it more likely for workforce users to have admin rights formerly exclusive to IT admins. Users with such privileges face constant risks as attackers exploit identities to breach and navigate enterprise networks. To counter this, organizations must implement additional controls tailored to the specific actions, applications, or data accessed—both at login and beyond—to enhance workforce security. Watch CyberArk experts as they delve into these foundational controls, also known as Intelligent Privilege Controls, and share how you can easily apply them across your workforce to safeguard users navigating the intricate risk spectrum in their daily activities.
-
Going Beyond the Perimeter: Strategies to Secure Your Workforce and Endpoints
Ana Meneghel, Matt Laufer
As more than 70% of reported security breaches are attributed to identity-based threats, questions arise about the relevance of the perimeter concept in safeguarding workforce identities and endpoints. Today, organizations must embrace a security-first mindset that transcends the traditional perimeter, adopting comprehensive identity and access controls that span the identity lifecycle from login and beyond. Watch this session to explore how to adopt the identity perimeter approach, the inherent risks in using traditional controls and the importance of a holistic IAM strategy in safeguarding workforce identities and endpoints that extend beyond the perimeter.
-
IAM Evolution: Enhancing Security in a Hybrid World of Evolving Threats
Dan Zadik, Chad Miller
Join this session as we delve into the challenges with using traditional IAM solutions, what to look for in modern IAM solutions, and how to utilize intelligent privilege controls and transition from an outdated IAM framework to one that is tailored for your organization’s business and security needs in today’s threat landscape.
-
Key Identity Guidance with SC Media and CyberArk
Khizar Sultan, Jim Desmond
As the digital landscape continues to evolve, identity management remains a critical component of cybersecurity strategy. Watch this informative webinar where leading experts provide essential guidance on navigating identity challenges and opportunities. You'll learn the latest trends in identity and access management (IAM), emerging threats, and best practices for securing digital identities in an increasingly complex environment. Viewers will gain valuable insights into innovative technologies, regulatory developments, and practical strategies for enhancing identity resilience.
-
Every User Can Be a Privileged User: Securing Access for High-Risk Workforce Users
Maor Franco, Seth Garlett
Watch this informative session to learn how privilege has shifted in the modern workplace, how today’s threat actors take advantage of this shift and what organizations can do to safeguard their high-risk workforce to better implement a Zero Trust strategy.