Featured
Balancing Risk and Organizational Priorities with the CyberArk Blueprint
James Creamer, Senior Manager, Security Strategic Advisory for CyberArk
If you are experiencing an organizational tug-of-war in planning your identity security program, you are not alone. Based upon decades of experience, the CyberArk Blueprint for Identity Security was designed to help organizations prioritize initiatives for maximum risk reduction. In this session, CyberArk’s Security Advisory Group breaks down tools, techniques and methods for balancing organizational priorities and drivers with meaningful risk reduction. Learn how to use the CyberArk Blueprint, our identity security best practices program framework, to balance the needs and requirements of your organization as you protect against malicious actors. Whether your organization’s priorities are driven by operational efficiency, an internal incident, a zero trust initiative or something else, the insights will help you to validate your approach against the lessons learned via 8,500+ deployments globally.
All episodes
-
Top Considerations for Identity Security Platforms
CyberArk
A robust Identity Security strategy breaks the usual silos of identity tools and instead takes a holistic approach, applying intelligent privilege controls to all identities – human and machine – with continuous threat detection and prevention across the entire identity lifecycle. It’s not only possible; it is the preferred approach organizations take. We'll explain what an Identity Security platform should offer and why.
-
Identity Security Blueprint to the Rescue
CyberArk
The CyberArk Blueprint was designed to help organizations better understand the attack chain, assess their own security, provide Identity Security best practices and ultimately help build a plan to measurably reduce risk.
Gain actionable insights, including foundational concepts of Identity Security maturity into your strategy, priority initiatives to mitigate threats and making the most of your existing capabilities. We also share findings from a recent report on Identity Security maturity and explain how those insights play a role in the decision-making process.
-
Underestimated Risk: Common Cloud and DevOps Misconfigurations
CyberArk
The goal of the Attack & Defend series is to inform organizations about current threats in an engaging way, while arming participants with best practices to reduce risk. For a reality-based experience with timely defense insights, we tap current CyberArk Labs research on threats seen and experienced in the wild, as well as insights gained from actual breaches our incident responders have addressed. We simulate a head-to-head battle.
In this session, we demo some of the most common misconfigurations in Cloud and DevOps environments that attackers can exploit and show you how to effectively mitigate risk. Zero-days grab headlines, but an attacker is more likely to use one of the exploits we demonstrate. -
How Dark Web Credentials Lead to a Software Supply Chain Attack
CyberArk
Organizations are experiencing an explosion of human and machine identities, driven by digital initiatives and rapid innovation. This in turn has significantly increased exposure to ransomware, software supply chain attacks and other threats, giving rise to a new generation of cyber criminals.
Cyber criminals continuously seek to make their attacks more resilient, more disruptive and harder to counter. Harder yes, but not impossible. Our extensive security experience is rooted in protecting privileged access, a practice that must extend beyond the IT admin to all identities – human and machine.
For a reality-based experience with timely defense insights, we tap current CyberArk Labs research on threats seen and experienced in the wild, as well as insights gained from actual breaches our incident responders have addressed. We will simulate a head-to-head battle.
In this session, our team will simulate a software supply chain attack in which an attacker uses credentials obtained on the dark web to breach a managed service provider (MSP) and execute ransomware on an unsuspecting customer. -
Fireside chat: Trends Driving an Identity Security Approach
CyberArk
New identities, new environments and new attacks methods require a new approach to secure your organization’s most valuable resources. The threat landscape looks dramatically different today, and more than half of CISOs (52%)* feel their board and senior leadership are not completely prepared for the cyber risks they foresee.
Employees and third-party vendors work from anywhere, on multiple devices. Any human and machine identity can be assigned high-risk permissions and become a “privileged user.” Hybrid and cloud environments are massively complex. Threats, from AI-fueled ransomware to complex software supply chain attacks, are constantly growing in sophistication.
Topics covered include:
• Cyber debt resulting from exponential investments in digital and cloud initiatives
• Workforce trends that intensify insider threats
• An identity security approach that delivers measurable cyber risk reduction
Today’s threats require an identity security approach built to protect every identity (human and machine) across every environment. Get clarity on threats and perspective on how CyberArk and transformational organizations keep a step ahead of attackers.
*https://fticommunications.com/topic/trending-topics/ciso-communications-redefined/ -
Maximize Risk Reduction with an Identity Security Approach
CyberArk
The proliferation of identities, combined with cloud migration and accelerating attacker innovation, has created the perfect storm for security teams facing a surge in identity-based cyberattacks. Today, any identity can become privileged based on what it can access and the actions it can take. Attackers increasingly target a full spectrum of identities including workforce users – finance teams and developers. For an organization to be secure, every identity must have the right level of intelligent privilege controls.
In this 30-minute session, experts from CyberArk’s field technology office explain how to maximize risk reduction by seamlessly managing and securing all identities.
Key take aways include:
Market trends and a fresh take on the traditional attack path
Intelligent privilege controls and how to put them into practice
Correlating controls to levels of risk posed by users/access with minimal friction
Identity security platform requirements -
A Security-First Approach for Cloud Productivity and Velocity
Shay Saffer, VP, Engineering, CyberArk | Simon Ratcliffe, CIO Mentor and Advisor
The Cloud offers many benefits for organizations, but it has also introduced complex challenges and risks for securing new identities in new environments. Consider for example, CyberArk’s analysis of the three major CSPs shows that without careful scoping a user can access approximately 1,400 native services (e.g., AWS S3, Microsoft Azure Kubernetes Service or Google Cloud BigQuery), which collectively have 40,000 different access controls … and that number grows every day.
In this fireside chat, we’ll explore new security requirements in Cloud environments that must be prioritized to protect an organization’s most valuable assets. We’ll explain the benefits of taking an identity security approach and applying proven best practices including– secure native access with zero standing privileges and audibility of high-risk sessions.
Key takeaways from this session:
- The benefits of implementing access with Zero Standing Privileges for the native services running in your Cloud
- How to reduce risk by removing standing access without impacting productivity
- How to increase adoption and utilization among Cloud developers and engineers -
Identity Security Trailblazers - Healthfirst
Brian Miller, CISO at Healthfirst and Amy Blackshaw, VP of Product Marketing at CyberArk
Learn how Brian Miller, CISO at Healthfirst, has successfully pioneered identity security within his healthcare organization, strengthening protections for more than 1.8 million members.
CyberArk understands that identity security is fundamental for building an effective cybersecurity infrastructure. A focus here helps CISOs and other cybersecurity leaders improve identity security posture and protect personal health information (PHI) – all while reducing costs.
Gain valuable insights for your organization as Brian Miller, CISO at Healthfirst and Amy Blackshaw, VP of Product Marketing at CyberArk highlight:
- Seamless and secure access for all identities using SSO and MFA
- Replacing multiple tools with a unified Identity Security platform
- The importance of security within your organization
- Protecting human, machine, and 3rd party identities
- Protecting Personal Health Information (PHI) -
Tales from the Trenches: A Fireside Chat with CyberArk's Incident Response
CyberArk
Listen in on a fireside chat with CyberArk’s experts working on the front lines of today’s threat landscape. They share insights that will help you identify and bridge gaps in your defense. In this conversation led by CyberArk Labs, we will explore what threat actors are doing in the wild today, and how CyberArk’s Red Team emulates these attacks and bypasses detection. You’ll also get behind-the-scenes insights on how an Incident Response team helps organizations remove the threat actors and recover by rebuilding trust with identity security.
-
Five Privilege Controls Essential for Identity Security
CyberArk
To effectively protect your organization’s critical systems and sensitive data, it’s imperative to consider the full spectrum of identities, both human and machine, with access to a growing ecosystem of infrastructure and applications.
It’s equally important to correlate controls with the levels of risk an identity poses to your organization should their access be compromised. In this session, we focus on this correlation and explain how to effectively apply and enforce dynamic and adaptive controls, such as just-in-time access with zero standing privileges.
-
The Power of “Zero” in a Digital World
Claudio Neiva, Field Technology Director at CyberArk
In today’s rapidly evolving digital ecosystem, Cybersecurity is both a technical challenge and business imperative. The need to ensure the integrity, security and privacy of user information has never been greater. Following a “never trust, always verify” Zero Trust approach is an effective way to secure identities, endpoints, applications, data, infrastructure and networks, while providing visibility, automation and orchestration. Identity is the primary way organizations can determine and manage who has access to which resources – and under what conditions – and ensure that those access privileges are used appropriately. In this session, we cover emerging trends in identity security and IAM, effective identity-first security strategies and how to enhance user experiences with an identity security framework.
-
Developing a Next-Level Cyber Insurance Strategy
CyberArk
You may be familiar with current Cyber Insurance requirements, but do you have a forward-thinking security strategy, one that goes beyond “checking a box” and helps you to carefully plan for future renewals? In this session, we’ll highlight the critical elements of a proactive security program, and we’ll provide examples of how to effectively showcase your organization to successfully obtain a policy or renewal.
There isn’t a perfect security program. Storytelling is an important part of the process. Be ready to share a narrative about the plan you have in place now and how you will advance your program to address any gaps for risk reduction.
In this session, Nick Graf, Vice President, Cyber Risk Control CNA Insurance and James Creamer, Senior Manager, Security Strategic Advisory CyberArk provide guidance on how to:
Practically implement security controls
Effectively communicate your strategy
Plan for the next renewal.Nick Graf, Vice President,Cyber Risk Control for CNA Insurance and James Creamer, Senior Manager, Security Strategic Advisory for CyberArk
-
Balancing Risk and Organizational Priorities with the CyberArk Blueprint
James Creamer, Senior Manager, Security Strategic Advisory for CyberArk
If you are experiencing an organizational tug-of-war in planning your identity security program, you are not alone. Based upon decades of experience, the CyberArk Blueprint for Identity Security was designed to help organizations prioritize initiatives for maximum risk reduction. In this session, CyberArk’s Security Advisory Group breaks down tools, techniques and methods for balancing organizational priorities and drivers with meaningful risk reduction. Learn how to use the CyberArk Blueprint, our identity security best practices program framework, to balance the needs and requirements of your organization as you protect against malicious actors. Whether your organization’s priorities are driven by operational efficiency, an internal incident, a zero trust initiative or something else, the insights will help you to validate your approach against the lessons learned via 8,500+ deployments globally.