Featured
Advanced Strategies for Reducing Risk at and Beyond the Identity Perimeter
Adam Markert, Brandon McCaffrey
While “Identity is the new and last standing security perimeter” isn’t unfamiliar, not all organizations have fully embraced it in practice. Today many still rely solely on MFA to secure their workforce identities and fail to properly manage and secure privilege at endpoints. This creates a much wider attack surface for threat actors to work with, and a false sense of security for organizations looking to reduce risk at and beyond the Identity perimeter. So how can organizations take their risk mitigation practices to the next level?
In this session, CyberArk experts deep dive into advanced strategies and capabilities, including implementing phishing-resistant end-to-end passwordless authentication and Endpoint Identity Security, to reduce the attack surface and thwart potential threats at and beyond the Identity perimeter.
All episodes
-
Securing the Future: Exploring Emerging Trends in Endpoint Security
Andrey Pozhogin, Senior Product Marketing Manager-Endpoint, CyberArk and Jack Poller, Senior Analyst with ESG
By deploying endpoint privilege management, business leaders, security, and IT teams have an excellent opportunity to apply the principles of zero trust and least privilege access and bring significant benefits to their organizations, including:
• Render vulnerabilities unexploitable by removing local admin rights.
• Stop credential theft.
• Simplify IT workflows and harden endpoints without impacting productivity.
• Address specific regulatory requirements and create an audit trail for privileged actions.Join this exclusive panel discussion with experts from ESG and CyberArk to gain practical insight into current endpoint security trends, why managing and securing endpoints is difficult, how endpoint privilege management addresses threats, and how CyberArk’s endpoint privilege management solution enforces least privilege and works across all Windows, macOS and Linux endpoints.
-
Level Up Your Security Stack EDR vs Endpoint Privilege Management
CyberArk
As technology progresses, breaches progress and with hybrid work environments as the new norm, this means more devices are outside of the corporate network.
The question organizations must ask is how can users securely perform their work with a set of least privileges while preventing business disruption? The answer is Endpoint Privilege Management (EPM). EPM can help secure your endpoints from different hacking tactics.
In this webinar learn more about how to secure endpoints with the flexibility of EPM without sacrificing end-user experience/efficiency; differences between EDR and EPM and how they can work together to deal with applications that are not yet trusted; what the implementation of security tools looks like.
-
Mitigation of Zero Days Using Scripting and Dynamic Policy Application
Jeff Vealey
In this webinar, Jeff Vealey explores least privilege in cybersecurity, using real-world examples of weaponized applications like PrintNightmare and Teams GIFMeControl. Beginning with a precise definition of least privilege, the analysis underscores its critical role in strengthening digital defenses.
Examining the historical backdrop of zero-day vulnerabilities, the webinar discusses traditional security approaches, setting the stage for understanding the power of least privilege in enhancing security postures and mitigating potential breaches. Together, we will focus on the proactive measures necessary to navigate the dynamic threat landscape successfully. This event aims to equip cybersecurity practitioners with actionable insights to fortify systems against emerging threats. -
Practical Least Privilege
Andrey Pozhogin
Most organizations recognize the need for least privilege but can stray off the path to full endpoint security after removing local admins, leaving points of access vulnerable for threat actors. How do you make sure your organization is fully secured without negatively impacting end user productivity and overall experience?
Join Andrey Pozhogin, Sr. Product Marketing Manager- Endpoint to learn about benefits of role-specific least privilege and how to stay on track for endpoint security.
In this webinar we cover:
- How to lay the groundwork for implementing Least Privilege
- How to start creating role-specific rulesets
- How to approach Role-Specific Least Privilege rollout
- Best practices, tips and tricks of Least Privilege implementation that crystallized from the experience that we acquired through thousands of EPM deployments -
Safeguarding Servers
Andrey Pozhogin
We know servers to be an attacker’s ultimate target, but while they do store or process large amounts of sensitive data, the argument can be made that the attack surface is somewhat limited and thus more secure. True, non-IT users don’t usually have access to servers, meaning less non-qualified users making bad choices, but that doesn’t mean servers are immune to cyber risk and should be left unprotected.
Today we offer a different look at server risk and server security by examining the risk resulting from the inability to gain visibility and maintain control – the risk that feeds on our limitations as humans.
The more often we need to fill the technology gap with human-centric processes, the more often we need to rely on humans’ attentiveness and thoroughness, increasing the chance that an error will be made which will persist through countless audits and infrastructure changes, to be discovered and exploited by an attacker, and become a springboard that will propel the organization right into the media spotlight.
Register for this webinar and walk away with an understanding of how:
• Intuitive, concise, policy-based role-specific least privilege delivers visibility and control over privileged actions on Windows and Linux servers
• To rapidly reduce privilege risk on servers and achieve least privilege with the QuickStart framework
• To simplify sudo management on Linux and move away from thousands of lines, aliases, and wildcards which we know to be common in enterprise IT environments -
No More Cookies for You: Attacking and Defending Credentials
Shay Nahari, VP of CyberArk Red Team and Andy Thompson, Research Evangelist of CyberArk
The techniques, tactics and procedures (TTP’s) used to bypass security controls continue to evolve at a rapid pace. Web-based applications have become essential to life and work, and our web browsers, which seemingly know everything about us, have become the prime targets for credential stealing attacks. In fact, threat actors and credentials stealing malware commonly target browsers to compromise stored credentials and session cookies, for they hold the secrets.
Like updating passwords on a regular basis, clearing web browser cookies is a cyber hygiene practice neglected by most. If hijacked, these cookies will enable attackers to bypass Multi-Factor Authentication (MFA), Single Sign-on (SSO) and gain access to critical business applications. Threat actors can use this technique as a jumping point to deploy malicious code, social engineer, and further carry out their attack.
Hear from Shay Nahari, VP of CyberArk Red Team and Andy Thompson, Research Evangelist of CyberArk Labs as they discuss and demonstrate how cookies and session IDs can be stolen with ease and how CyberArk Endpoint Privilege Manager (EPM) credential theft protection can prevent this and many other emerging techniques from being used against your organization. -
Endpoint Privilege Security: The Cornerstone of Identity Protection
Gabriela Galvao
Join us to explore the crucial role of securing privileges, credentials, and the web browser on endpoints in identity protection, using CyberArk Endpoint Privilege Manager. Our expert will discuss how CyberArk EPM becomes a cornerstone in your security strategy by eliminating local admin rights, enforcing role-specific least privilege, combating ransomware, and creating an audit trail.
Learn how to approach least privilege for various identity groups, define application control policies, fortify your organization against cyber threats, and enable a seamless user experience. This webinar is a must-attend for IT and security professionals seeking to enhance their organization’s security posture.
-
You Had Me at First Click: The Critical Role of the Secure Browser
Amy Blackshaw, VP of Product Marketing, CyberArk & Melinda Marks, Practice Director, Enterprise Strategy Group
Cybercriminals are increasingly targeting browsers to steal stored passwords, cookies and other information as a pathway to access sensitive data. To help defend against such attacks, CyberArk recently released CyberArk Secure Browser, a gateway to securing every identity. But what makes the CyberArk browser different from other enterprise browsers on the market?
Join us for this webinar as Amy Blackshaw, VP of Product Marketing, CyberArk, sits down with Melinda Marks to discuss CyberArk’s unique identity-centric approach to the browser and how it can thwart cyberattacks right from the first click.
This session will cover:
• The role of a secure browser in enabling end-to-end identity security
• Why cookie-less authentication matters
• The difference between identity access management and identity security -
Mastering Browser Security for Enterprise Defense
Laura Balboni, Brandon McCaffrey
Learn how an identity-centric web browser can enhance enterprise defense by countering evolving threats. Despite robust authentication measures, attackers often exploit vulnerabilities in the widely used enterprise application – the web browser. Discover proactive strategies to defend against browser-borne threats, secure access across devices and improve end-user experience while maintaining privacy. The CyberArk Secure Browser demonstrates effective integration with security measures to ensure comprehensive oversight and control.
-
Secure Browser: Bringing Identity Security to the Endpoint
Archit Lohokare, General Manager, Workforce and Endpoint Security Solutions and Todd Thiemann, Senior Analyst
"• Enterprise have struggled to deliver remote secure access to all their enterprise resources generally, even more today with business-critical data in cloud native services and SaaS apps. and secure browsing in particular for both employees and third parties. BYOD and unmanaged devices make this challenge particularly acute. Rise of social engineering identity centric attacks, with session hijacking and cookie-stealing attacks has further exacerbated this challenge. In this world, striking a balance security and productivity is critical, and the key to doing that is the paradigm of identity-centric secure browsing. This webinar discusses enterprise secure access challenges, the security threats, and how identity-centric secure browsing helps solve these challenges. "
-
Advanced Strategies for Reducing Risk at and Beyond the Identity Perimeter
Adam Markert, Brandon McCaffrey
While “Identity is the new and last standing security perimeter” isn’t unfamiliar, not all organizations have fully embraced it in practice. Today many still rely solely on MFA to secure their workforce identities and fail to properly manage and secure privilege at endpoints. This creates a much wider attack surface for threat actors to work with, and a false sense of security for organizations looking to reduce risk at and beyond the Identity perimeter. So how can organizations take their risk mitigation practices to the next level?
In this session, CyberArk experts deep dive into advanced strategies and capabilities, including implementing phishing-resistant end-to-end passwordless authentication and Endpoint Identity Security, to reduce the attack surface and thwart potential threats at and beyond the Identity perimeter.