Featured
Risk Mitigation Best Practices Based on Recent Breaches
Andy Thompson & David Higgins
Cyber threats and attack methods are evolving FAST, understanding recent breaches and how to prevent them from happening at your organization is critical. In our webinar, CyberArk Labs Deconstructing Attacker Methods in Recent Breaches, we reviewed some of the most significant breaches of the year. In this webinar we'll be taking a step further and providing you with actionable insights on risk mitigation, demonstrating how cybersecurity best practices can help safeguard your organization against similar threats.
All episodes
-
How to Achieve Continuous Audit & Compliance with PAM
CyberArk
Learn how PAM solutions address IT security audit requirements for privileged accounts by eliminating inconsistent processes, implementing least privileged, remediating compliance gaps, and streamlining session audit reviews. These processes help organizations meet global compliance and regulation frameworks where standards and certifications are required. CyberArk covers all industries and major compliance frameworks such as SOX, HIPAA, PCI DSS, NIS2 and a jumpstart to CMMC compliance as well as applies security controls to meet cyber insurance requirements.
In this webinar we covered:
• How Implementing a PAM solution can quickly reduce risk of privileged accounts and credentials, with reporting to satisfy audit and compliance
• Streamlining audit and compliance processes
• Industries and regulations where CyberArk solutions helps fill gaps
• Applying security controls to meet cyber insurance requirementsReady to learn from industry experts how to ensure a more secure and
compliant future for your organization? -
Why It's Time to Level Up Your PAM Program
Brandon Traffanstedt, Sr. Director Field Technology Office and Ryne Laster, Product Marketing Manage
As a security leader you are challenged with identity proliferation due to cloud adoption, securing systems and applications, the ever increasing amount of vendors, contractors, and third-parties, and sprawling attack vectors. This evolving attack surface has exposed an urgent need for modern use cases in your PAM program.
Join us on-demand with CyberArk's Brandon Traffanstedt, Sr. Director Field Technology Office and Ryne Laster, Product Marketing Manager as they discuss the following modern PAM use cases:
• Just-in-time access to cloud workloads
• Reducing privileges in cloud roles to advanced credential management
• Vendor consolidation
• The role AI is playing in identity-based attacksWhether you're building a new PAM program or rebuilding your current PAM strategy, the time to level up is now and CyberArk has you covered.
-
How PAM Tackles Accelerated Change in the Threat Landscape
David Higgins
The modern threat environment continues to evolve, with automation, the move to the cloud, software as a service, AI, new user expectations and increasingly sophisticated attacks from threat actors. How do we cope with those changes today - and the certainty that there will be new challenges tomorrow?
We do so by addressing the fundamentals of attack that don't change: Attackers use deception, steal identities and escalate privileges until they reach their target - and we evolve our defenses in line with the changed context.
"We can't secure everything on day one. We need a risk-based access approach. We need to categorize the access use cases and secure the highest-risk access first, said David Higgins, EMEA technical director, CyberArk.
In this interview with Information Security Media Group, Higgins also discusses:
-How to address the main challenges faced by defenders today;
-What our strategy needs to be in order to cope with tomorrow's unknown threats;
-How ID has played a key role in security and will continue to do so.Since joining CyberArk in 2010, Higgins has worked to help the world's leading - and most complex - organizations to secure and protect their privileged access. Today, he advises clients on threats associated with privileged escalation, lateral movement and credential theft and discusses best practices and driving innovation around privileged management processes.
-
Modern PAM Use Cases: Rewrite the Script On Your Identity Security Program
Josh Kirkwood and Lilach Faerman Koren
How are you securing high-risk access beyond IT admins? Join CyberArk and "ChatGPT" to discuss strategies for evolving resource-strapped privileged access management (PAM) programs and better protecting vendors, engineers and workforce users.
This session explores how CyberArk's Identity Security approach can help organizations overcome these challenges in hybrid and multi-cloud environments while maintaining a strong operational posture.
-
PAM Growing Pains You Didn't Know You Had
David Adamczyk and Matt Tarr
Are you having challenges getting your PAM project phase 1 goals completed with your PAM vendor? Are you looking to expand beyond traditional PAM to meet modern security, audit and cyber-insurance requirements, but you may be questioning your PAM partner’s ability to support you. CyberArk works with companies just like you, to help you get your PAM program right.
The world has changed exponentially in the past 5 years and CyberArk has evolved with it. Success requires a native experience and integration with modern tools, creating a process that does not slow operations but measurably increases security and allows for improved audit.
Join us with CyberArk’s David Adamczyk VP, Sales Strategy and Development and Matt Tarr, Solutions Architect. We look forward to sharing how our investments in technology, people, and process have allowed us to partner with and enable organizations to meet their foundational and current needs without slowing the business.
-
Why You Need a Battle-Tested PAM Program
Brandon Traffanstedt and Ryne Laster
Why You Need a Battle-Tested PAM Solution in a time where digital assets are the crown jewels of organizations, securing privileged access is a must. With decades of digital battlefield experience, discover how CyberArk PAM, built for security from Day 1, can help fortify your organization against the ever-evolving threat landscape.
Join us to learn why a battle-tested PAM solution is best to deliver cyber-risk reduction, enable operational efficiencies, and satisfy audit and compliance across your workforce.
-
Reimagining Privileged Access Management
Chris Maroun and Hemal Shah
"There is more to Privileged Access Management (PAM) than what meets the eye. In this dynamic and thought-provoking discussion, join us as we explore the concept of ""Reimagining Privileged Access Management"" and touch on various dimensions of PAM that extend beyond traditional paradigms of vaulting and into Identity Security. Join us as we reimagine PAM and uncover its ever-evolving role in the modern security landscape.
Featuring Chris Maroun, Senior Director, Field Technology Office at CyberArk in conversation with Hemal Shah, Principal (Partner), KPMG LLP Cyber Security – US PAM Services Leader, as they delve into the world of PAM.
Watch to learn more about:
-Gain a comprehensive understanding of the evolving landscape of Privileged Access Management beyond traditional vaulting paradigms.
-Explore the intersection between PAM and Identity Security, uncovering synergies and best practices for enhanced your organization's cybersecurity posture.
-Acquire actionable insights for addressing emerging security challenges and its significance in safeguarding organizational assets." -
Identity Security Clinic
James Creamer & David Higgins
"Introducing CyberArk’s Identity Security Clinic. Where experts dissect and diagnose your identity security challenges and prescribe a path forward with a comprehensive solution including actionable insights and strategies to safeguard all identities across your organization.
In this Clinic we take a close look at an organization with a complex environment that was attacked and needs to be protected and set up for a successful audit. We will discuss a solution by answering the question, ""Identity security, where to start?"" and break it down into the following four parts:
-Utilizing discovery to identify security gaps
-Grouping different types of identities
-Putting intelligent policies in place
-Detecting and preventing future threats
Join us to learn how to master Identity Security best practices, apply zero trust principles, and reduce risk across all your IT admins, developers, non-human and workforce identities. By synergizing workforce identity security with robust IT security measures, organizations can establish a resilient defense against cyber threats while fostering a secure and productive working environment." -
The Critical Role of Identity Security in the Modern IT Environment
David Higgins
"A robust data governance framework is the cornerstone of secure, user-friendly, and compliant data operations. This webinar will feature industry experts sharing practical strategies, best practices, and innovative technologies for implementing a comprehensive framework. Watch to hear from CyberArk's David Higgins, Sr. Director, Field Technology Office as he dives into:
-Quick introduction around Identity concepts
-How Identity can be exploited to undermind data governance
-Who or what do we need to consider to ensure our data integrity, confidentiality and availability?" -
From the Data Center to the Cloud: Optimizing & Modernizing IT Infrastructure
Mark Hurter
It’s not about where your data and applications live, it’s about how well they run. While the main trend in the industry is toward more cloud, not every application can or should run in the cloud, and even those applications that are in the cloud can often run better.
Watch this webinar to learn how to optimize and modernize your IT infrastructure, no matter where it is so your privileged sessions are secured.
-
CyberArk Identity Security Trailblazers | Driving Operational Technology Safely
Christian Goetz, Oliver Shiller
The manufacturing industry is rapidly evolving, and operational technology (OT) environments are at the core of innovation, production, and efficiency – all to drive key business initiatives. At CyberArk, we understand that digitizing traditional processes might feel like a daunting task.
A weak identity security posture and unauthorized access to privileged accounts in OT systems can lead to production halts, safety risks, and financial loss. This emphasizes the necessity of securing every identity, both human and machine, with the right level of privilege and controls. CyberArk’s redefined Privileged Access Management (PAM) program easily safeguards your critical systems, identities, and operations.
Christian Goetz, CyberArk’s Director, PreSales Success and Oliver Schiller, Customer Success at CyberArk, and former Mercedes-Benz Manufacturing, share insights, trends, and use cases around manufacturers looking to improve their identity security posture while mitigating risk. Hear from Todd Bopell, Chief Operating Officer at the National Association of Manufacturers (NAM) as he shares the manufacturing industry's perspective on smart factories, digital production, and the need for cybersecurity. Learn how to protect sensitive operations from external threats and insider vulnerabilities when armed with:
-The unique cybersecurity needs of OT environments
-The evolving role of PAM vs. traditional IT security measures
-Best practices for implementing PAM, including role-based access control, session monitoring, and just-in-time access
-Future trends in cybersecurity for manufacturing -
The Who's Who of IT Admins and How to Secure Them
Hamza Tariq & Adam Markert
Watch to learn about different types of high-risk and administrative accounts, and the best practices to secure these human and non-human identities. Protecting access to critical systems and extending these controls to secure an evolving landscape is critical. We will discuss foundational principles, best practices for securing access to accounts with persistent access, how zero-standing privileges (ZSP) and just-in-time (JIT) reduces risk of credential theft past the principle of least privilege, and how to secure identities that are becoming frequent targets of attackers.
-
Building an Audit-Ready Proactive Compliance Program
David Higgins and Ryne Laster
Watch as we discuss how privileged access manangement (PAM) and identity security come together to meet the rigorous demands of audit and compliance in today's stringent regulatory environment. We will discuss the key principles of PAM and identity security to quickly reduce risk of high-risk accounts, applying security controls to meet cyber insurance requirements, and tips for building a proactive compliance program so your organization is audit-ready.
-
Securing Admins, Engineers and Developers in Digital Native Businesses
Ryne Laster and Josh Kirkwood
Watch to learn how we can help your organization secure IT admins and developers with breakthrough capabilities for Zero Standing Privileges and secure high-risk access for IT teams across all environments. CyberArk provides foundational PAM controls, modern session management to cloud workloads, JIT access with ZSP, and enables engineering velocity and efficiency through native user controls.
-
Powered By CyberArk: Showing Companies How to Achieve NIS2 Compliance
David Higgins, Sr. Director, Field Technology Office , CyberArk and Luka Pavka, Lead Architect- Senior Manager, PwC
The European Union’s updated Network and Information Systems Directive (NIS2) comes into effect in October 2024. Ensuring best practice governance and reducing exposure to cyber-attacks are top business priorities right now, so following this legislation is a non-negotiable for those who want to protect themselves.
You should start by taking these steps towards compliance. Register for this webinar to learn more about:
Understanding more about the impact of NIS2 on your business
Learning about what other companies are doing for NIS2
Getting guidance on how your organization can be compliant. -
Implementing Zero Standing Privilege and Just in Time Access
Josh Kirkwood and Brandon Traffanstedt
IT admins and developers are two highly targeted identities for attackers. So what's the best way to tackle their unique access needs without adding hurdles to their day-to-day workflows? Enforce just-in-time access principles and least privilege whenever possible.
Join us for a deep dive into the practical applications of just-in-time access and newer themes like zero standing privileges. We’ll explore how these concepts can be combined to bring both operational and security focused benefits with the goal of minimizing standing entitlements while maximizing visibility and user experience across data center and Cloud environments.
In this webinar, you will learn how to bring your security program from foundational to exceptional through best practices for both securing IT admins and developers, as well as discover:
How to deliver measurable cyber risk reduction while maintaining operational efficiency across these sensitive personas
How to reduce compliance gaps across environments
How to overcome identity explosion -
Secure Your Vendors' Access from Attacks on Third-party Vulnerabilities
Matthew Bender and Guy Yemin
Maintaining a strong identity security program for employees and remote users is paramount when analyzing threats to an organization's critical assets. Join us to learn more about extending privileged access management to remote workforce, third parties, and external vendors centered around Zero Trust principles. We'll focus on use cases for a modern approach to securing remote access, audit and compliance considerations, and best practices when exploring efficient ways to secure external access for privileged and business users.
-
Modernize Your PAM Program for a Multi-Cloud World
Ryne Laster, Product Marketing Manager, CyberArk and Chris Maroun, Field CTO, CyberArk
Join us to learn how CyberArk modernizes PAM programs for hybrid and multi-cloud environments. We'll cover right-sized privilege controls with Just-in-time (JIT) access and zero standing privileges (ZSP), enhancing your program to protect against emerging threats.
-
CyberArk Labs Deconstructing Attacker Methods in Recent Breaches
Andy Thompson
In an era where cyber threats are evolving at an unprecedented pace, understanding the tactics and techniques used by attackers is crucial for effective defense. This webinar, presented by CyberArk Labs, delves into some of the most significant breaches of the year, offering an in-depth analysis of the methodologies employed by cyber adversaries. We will explore how these attacks were orchestrated, identifying the common threads and unique strategies that made them successful. Watch to gain a clearer understanding of the current threat landscape.
-
Risk Mitigation Best Practices Based on Recent Breaches
Andy Thompson & David Higgins
Cyber threats and attack methods are evolving FAST, understanding recent breaches and how to prevent them from happening at your organization is critical. In our webinar, CyberArk Labs Deconstructing Attacker Methods in Recent Breaches, we reviewed some of the most significant breaches of the year. In this webinar we'll be taking a step further and providing you with actionable insights on risk mitigation, demonstrating how cybersecurity best practices can help safeguard your organization against similar threats.