WEBCAST SERIES
ON THE FRONT LINES 
Register Now!


Every Tuesday, CyberArk's On The Front Lines series covers hot topics and details related to security exploits involving privileged accounts. The threat will be reviewed and then they'll dig into the CyberArk technology that will help you secure your systems from these risks. Below are the upcoming sessions.

Privileged Account Security Inside Industrial Control Systems(ICS)

June 20 / 2PM EST

Learn how to stop a takeover of the world’s most important environments.: Chris Maroun

:

CyberArk ICS specialists will discuss how the Privileged Account Security solution can be utilized to help stop advanced privileged attacks within environments such as NERC, CIP, SCADA, and other ICS regulated network configurations. 

Deploying a Complete CyberArk Environment in AWS with AMI Instances

June 27 / 2PM EST

Presenter Heading: Andy Givens

:

During this webinar, we’ll demonstrate how to automatically deploy and establish a complete CyberArk Privileged Account Security environment in a preconfigured AWS environment in as little as 15 minutes using CyberArk cloud automation capabilities. The cloud automation capabilities include CyberArk AMIs (Amazon Machine Images) and CloudFormation templates to automate the deployment of CyberArk and to prepare the AWS environment for the automated deployment.

We’ll review how to:

  • Quickly deploy CyberArk in AWS with AMI instances. 

  • Leverage AWS privileged account security best practices, including using separate AWS Availability Zones for the cloud assets, and the primary and DR vaults, thus ensuring that the vaults are both independent from each other. 

  • Use additional CyberArk CloudFormation templates to automate configuring the AWS VPCs (Virtual Private Clouds), private and public subnets, Security Groups and other elements of the AWS environment to prepare for automated deployment of CyberArk solutions.

Secured Credential Scans: When Vulnerability Management is Powered by Privilege

July 18 / 2PM EST

Tenable and CyberArk securely synchronize credentials within the Tenable scanners: Pete Danner

:

In order to attain comprehensive, enhanced results, vulnerability scanners require credentials every time they need to perform a trusted scan. But hard coding/storing credentials within a vulnerability solution configuration file or code can introduce risk into the process – leaving the credentials exposed to possible compromise. As such, organizations need to enable intelligent vulnerability-driven access control enforcement. To eliminate the need to store a copy of privileged credentials in the Tenable.io™ solution, Tenable and CyberArk have joined forces to secure, manage and rotate these credentials.

In this session, we’ll introduce the how the integration automatically:

  • Synchronizes credentials within the Tenable scanners and the target systems, and secures these powerful credentials according to your security policies.
  • Authenticates vulnerability scanners before granting credentials and privileged user access to a specific machine to help maintain the IT environment integrity.
  • Blocks user access to specific resources that shows high-risk vulnerability scores until the vulnerability is resolved (or allows privileged user access via a secured channel).
  • Securely tracks resources and vulnerabilities while accommodating dynamic assets like cloud and containers.

Cloud Security Use Cases – A Panel Discussion

July 25 / 2PM EST

Insights via use cases and lessons learned: Chris Smith

:

Chris Smith headshot.jpg

This session offers the unique opportunity to learn first-hand about deployments related to privileged account security in cloud environments. Our panelist of CyberArk system engineers will provide insight related to the use case/business need, technical solution and lessons learned. Use case examples include securing:

  • Commercial SaaS applications
  • Cloud infrastructure (e.g., AWS Management Console)
  • Applications and other infrastructure (databases, OS, etc.) on public and private clouds 

Enhancing Security in Critical Infrastructure: Networking Technologies

August 1 / 2PM EST

Secure network devices by managing privileged access: Cory Brown

:

Cory Brown.jpg
The network is the foundation for secure communication inside of the organization. If compromised, your switches, routers, and firewalls, could open huge doors for attackers to establish persistence, exfiltration data, or bring down systems. Securing administrative access to networking infrastructure is key component to managing a secure network. Join us for this webinar to learn how CyberArk secures network devices by managing access to their administrative interfaces.

Shadow Admins: Underground Accounts That Undermine The Network

August 8 / 2PM EST

Learn about this significant threat - “the shadow admins”: Asaf Hecht and Len Noe

:

Asaf Hecht.png

Interested in a new and powerful way to define and discover privileged accounts? We will explain and demonstrate the significant threat - “the shadow admins” - that are the hidden privileged accounts that organizations and business regulations ignore, and the risk they are posing to the whole network. Attackers already know these “shadow admins” - what about you?

Learning Outcomes:

  • Learn about a completely new and privileged accounts layer that must be protected in every organization
  • Gain a new, practical methodology to discover hidden privileged accounts on the network and secure them
  • Understand AD objects’ ACLs and permissions and how to identify significant risks and bad configurations
  • Understand local user rights in Windows environments and how to utilize them for better cyber defense
  • Watch a real demonstration of unique permissions and user rights that attackers might use.

Proofpoint & CyberArk: Detect, Prioritize and Block Attacks from Escalating on Privileged User Machines

August 15 / 2PM EST

Gain real-time threat insights using rich evidence collection for quick & effective investigation: Chris Anderson (CyberArk) and Tim Sullivan (Proofpoint)

:

Chris Anderson.jpg

Security professionals are overwhelmed with alerts that require manual analysis to validate and prioritize, opening a window of opportunity for attackers to exploit a system and gain access to one of the most effective tools an attacker can add to their arsenal, privileged access. Security automation is required to offer context, enriched insight as well as to provide the tools needed to investigate, contain and remediate incidents. As such, multiple joint customers of CyberArk and Proofpoint requested we combine the incident response and automation of Proofpoint Threat Response together with the Privileged Account Security of CyberArk.

This session will demonstrate how Threat Response from Proofpoint, combined with CyberArk Privileged Account Security provides real-time operational insights and policy-based response capabilities for rapid risk mitigation and remediation:

  • Gain real-time threat insights using rich evidence collection for quick and effective investigation
  • Preconfigure policies and controls to reduce risks related to privileged users and sensitive assets
  • Isolate critical systems and quarantine user sessions to help prevent the spread of malware from vulnerable end-user devices

CyberArk & ForeScout Secured: enables an in-depth credential-protected discovery process.

August 22 / 2PM EST

See Devices. Enforce policy-based control of these devices. Secure the Privileged Access.: Vishal Patel

:

vishal patel.jpg

Learn how the CyberArk-ForeScout CounterACT™ integration relieves the administrator of the responsibility of managing privileged account credentials. This is done by securing and rotating credentials on endpoints, servers and network devices that ForeScout CounterAct monitors/accesses.

We’ll review:

  • Discovery – how ForeScout CounterAct discovers new endpoints that CyberArk isn’t currently managing and provides that information to the analyst. The analyst can then determine whether or not the endpoint should be added to the vault or blocked.
  • Alerts: ForeScout CounterAct receives alerts from PTA and allows you to take immediate action on an endpoint that appears to be compromised
  • ForeScout CounterAct will also be able to identify if CyberArk Endpoint Privilege Manager has been installed on an endpoint and if it’s running. If not, ForeScout CounterAct can enable CyberArk Endpoint Privilege Manager.

Strengthening Machine Identity Protection – A Combined Venafi and CyberArk Application Identity Manager Solution

September 12 / 2PM EST

Perform sensitive renewal, replacement and rekey operations without administrator involvement: Brian Durkin (Venafi) Joe Garcia and Kevin Ross (CyberArk)

:

Kevin Ross.jpg

As part of your SSL/TLS certificate lifecycle management process, Venafi uses privileged credentials stored in the Venafi solution. Based on security and operational needs, CyberArk and Venafi developed a joint integration to automatically protect and manage these credentials in CyberArk, making them available to Venafi, as needed, based on organizations’ security policy. Join us and learn how to:

  • Securely store privileged credentials used by Venafi in the CyberArk solution
  • Automatically rotate credentials used by the Venafi solution
  • Automatically perform credential- protected certificate renewal and replacement operations

Curse of the typo! Automate repeated tasks to improve efficiency and reduce risk around user mistakes

September 19 / 2PM EST

Automate privilege tasks to avoid user error and costly outages: David Higgins

:

David Higgins.jpg

Daily repetitive tasks can be inadvertently damaging to a business caused by things human error (typos!) and abuse of privileged access (insider threats!). Automated task management, both in the cloud and on-premises, safeguards your remote vendors and internal users alike by automating manual sometimes critically sensitive privileged tasks while simultaneously improving workflow productivity.

Join this session to see how CyberArk can automate an array of regular tasks with a single click to establish user accountability and better protect your environment.

Webinar Title

Webinar Date / 2PM EST

Presenter Heading: Presenter

:

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi vehicula laoreet ante nec vulputate. Aenean tincidunt eget tortor nec sollicitudin. Nullam maximus tortor justo, eu bibendum est fermentum eu. Aenean vestibulum dui at ipsum porttitor, in commodo nulla mattis. Sed pharetra dui rhoncus neque mollis, sed sollicitudin erat condimentum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum suscipit quis turpis id tincidunt. Proin id lacinia erat. In semper quis purus a egestas. Ut quis accumsan leo. Phasellus at velit a urna euismod porttitor. Pellentesque dapibus orci nibh, in tincidunt ipsum scelerisque nec. Phasellus ultricies nisl eget mi consectetur tincidunt. Aenean iaculis viverra feugiat. In sit amet nunc egestas massa egestas malesuada.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi vehicula laoreet ante nec vulputate. Aenean tincidunt eget tortor nec sollicitudin. Nullam maximus tortor justo, eu bibendum est fermentum eu. Aenean vestibulum dui at ipsum porttitor, in commodo nulla mattis. Sed pharetra dui rhoncus neque mollis, sed sollicitudin erat condimentum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum suscipit quis turpis id tincidunt. Proin id lacinia erat. In semper quis purus a egestas. Ut quis accumsan leo. Phasellus at velit a urna euismod porttitor. Pellentesque dapibus orci nibh, in tincidunt ipsum scelerisque nec. Phasellus ultricies nisl eget mi consectetur tincidunt. Aenean iaculis viverra feugiat. In sit amet nunc egestas massa egestas malesuada.

Webinar Title

Webinar Date / 2PM EST

Presenter Heading: Presenter

:

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi vehicula laoreet ante nec vulputate. Aenean tincidunt eget tortor nec sollicitudin. Nullam maximus tortor justo, eu bibendum est fermentum eu. Aenean vestibulum dui at ipsum porttitor, in commodo nulla mattis. Sed pharetra dui rhoncus neque mollis, sed sollicitudin erat condimentum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum suscipit quis turpis id tincidunt. Proin id lacinia erat. In semper quis purus a egestas. Ut quis accumsan leo. Phasellus at velit a urna euismod porttitor. Pellentesque dapibus orci nibh, in tincidunt ipsum scelerisque nec. Phasellus ultricies nisl eget mi consectetur tincidunt. Aenean iaculis viverra feugiat. In sit amet nunc egestas massa egestas malesuada.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi vehicula laoreet ante nec vulputate. Aenean tincidunt eget tortor nec sollicitudin. Nullam maximus tortor justo, eu bibendum est fermentum eu. Aenean vestibulum dui at ipsum porttitor, in commodo nulla mattis. Sed pharetra dui rhoncus neque mollis, sed sollicitudin erat condimentum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum suscipit quis turpis id tincidunt. Proin id lacinia erat. In semper quis purus a egestas. Ut quis accumsan leo. Phasellus at velit a urna euismod porttitor. Pellentesque dapibus orci nibh, in tincidunt ipsum scelerisque nec. Phasellus ultricies nisl eget mi consectetur tincidunt. Aenean iaculis viverra feugiat. In sit amet nunc egestas massa egestas malesuada.

Webinar Title

Webinar Date / Time Timezone

Presenter Heading: Presenter

:

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi vehicula laoreet ante nec vulputate. Aenean tincidunt eget tortor nec sollicitudin. Nullam maximus tortor justo, eu bibendum est fermentum eu. Aenean vestibulum dui at ipsum porttitor, in commodo nulla mattis. Sed pharetra dui rhoncus neque mollis, sed sollicitudin erat condimentum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum suscipit quis turpis id tincidunt. Proin id lacinia erat. In semper quis purus a egestas. Ut quis accumsan leo. Phasellus at velit a urna euismod porttitor. Pellentesque dapibus orci nibh, in tincidunt ipsum scelerisque nec. Phasellus ultricies nisl eget mi consectetur tincidunt. Aenean iaculis viverra feugiat. In sit amet nunc egestas massa egestas malesuada.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi vehicula laoreet ante nec vulputate. Aenean tincidunt eget tortor nec sollicitudin. Nullam maximus tortor justo, eu bibendum est fermentum eu. Aenean vestibulum dui at ipsum porttitor, in commodo nulla mattis. Sed pharetra dui rhoncus neque mollis, sed sollicitudin erat condimentum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum suscipit quis turpis id tincidunt. Proin id lacinia erat. In semper quis purus a egestas. Ut quis accumsan leo. Phasellus at velit a urna euismod porttitor. Pellentesque dapibus orci nibh, in tincidunt ipsum scelerisque nec. Phasellus ultricies nisl eget mi consectetur tincidunt. Aenean iaculis viverra feugiat. In sit amet nunc egestas massa egestas malesuada.

Webinar Title

Webinar Date / Time Timezone

Presenter Heading: Presenter

:

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi vehicula laoreet ante nec vulputate. Aenean tincidunt eget tortor nec sollicitudin. Nullam maximus tortor justo, eu bibendum est fermentum eu. Aenean vestibulum dui at ipsum porttitor, in commodo nulla mattis. Sed pharetra dui rhoncus neque mollis, sed sollicitudin erat condimentum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum suscipit quis turpis id tincidunt. Proin id lacinia erat. In semper quis purus a egestas. Ut quis accumsan leo. Phasellus at velit a urna euismod porttitor. Pellentesque dapibus orci nibh, in tincidunt ipsum scelerisque nec. Phasellus ultricies nisl eget mi consectetur tincidunt. Aenean iaculis viverra feugiat. In sit amet nunc egestas massa egestas malesuada.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi vehicula laoreet ante nec vulputate. Aenean tincidunt eget tortor nec sollicitudin. Nullam maximus tortor justo, eu bibendum est fermentum eu. Aenean vestibulum dui at ipsum porttitor, in commodo nulla mattis. Sed pharetra dui rhoncus neque mollis, sed sollicitudin erat condimentum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum suscipit quis turpis id tincidunt. Proin id lacinia erat. In semper quis purus a egestas. Ut quis accumsan leo. Phasellus at velit a urna euismod porttitor. Pellentesque dapibus orci nibh, in tincidunt ipsum scelerisque nec. Phasellus ultricies nisl eget mi consectetur tincidunt. Aenean iaculis viverra feugiat. In sit amet nunc egestas massa egestas malesuada.

Webinar Title

Webinar Date / Time Timezone

Presenter Heading: Presenter

:

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi vehicula laoreet ante nec vulputate. Aenean tincidunt eget tortor nec sollicitudin. Nullam maximus tortor justo, eu bibendum est fermentum eu. Aenean vestibulum dui at ipsum porttitor, in commodo nulla mattis. Sed pharetra dui rhoncus neque mollis, sed sollicitudin erat condimentum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum suscipit quis turpis id tincidunt. Proin id lacinia erat. In semper quis purus a egestas. Ut quis accumsan leo. Phasellus at velit a urna euismod porttitor. Pellentesque dapibus orci nibh, in tincidunt ipsum scelerisque nec. Phasellus ultricies nisl eget mi consectetur tincidunt. Aenean iaculis viverra feugiat. In sit amet nunc egestas massa egestas malesuada.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi vehicula laoreet ante nec vulputate. Aenean tincidunt eget tortor nec sollicitudin. Nullam maximus tortor justo, eu bibendum est fermentum eu. Aenean vestibulum dui at ipsum porttitor, in commodo nulla mattis. Sed pharetra dui rhoncus neque mollis, sed sollicitudin erat condimentum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum suscipit quis turpis id tincidunt. Proin id lacinia erat. In semper quis purus a egestas. Ut quis accumsan leo. Phasellus at velit a urna euismod porttitor. Pellentesque dapibus orci nibh, in tincidunt ipsum scelerisque nec. Phasellus ultricies nisl eget mi consectetur tincidunt. Aenean iaculis viverra feugiat. In sit amet nunc egestas massa egestas malesuada.

ABOUT CYBERARK

CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world's leading companies — including 45% of the Fortune 100 — to protect their highest-value information assets, infrastructure and applications.