WEBCAST SERIES
ON THE FRONT LINES 
Register Now!


Every Tuesday, CyberArk's On The Front Lines series covers hot topics and details related to security exploits involving privileged accounts. The threat will be reviewed and then they'll dig into the CyberArk technology that will help you secure your systems from these risks. Below are the upcoming sessions.

Privileged Account Security Inside Industrial Control Systems(ICS)

June 20 / 2PM EST

Learn how to stop a takeover of the world’s most important environments.: Chris Maroun

:

CyberArk ICS specialists will discuss how the Privileged Account Security solution can be utilized to help stop advanced privileged attacks within environments such as NERC, CIP, SCADA, and other ICS regulated network configurations. 

Deploying a Complete CyberArk Environment in AWS with AMI Instances

June 27 / 2PM EST

Presenter Heading: Andy Givens

:

During this webinar, we’ll demonstrate how to automatically deploy and establish a complete CyberArk Privileged Account Security environment in a preconfigured AWS environment in as little as 15 minutes using CyberArk cloud automation capabilities. The cloud automation capabilities include CyberArk AMIs (Amazon Machine Images) and CloudFormation templates to automate the deployment of CyberArk and to prepare the AWS environment for the automated deployment.

We’ll review how to:

  • Quickly deploy CyberArk in AWS with AMI instances. 

  • Leverage AWS privileged account security best practices, including using separate AWS Availability Zones for the cloud assets, and the primary and DR vaults, thus ensuring that the vaults are both independent from each other. 

  • Use additional CyberArk CloudFormation templates to automate configuring the AWS VPCs (Virtual Private Clouds), private and public subnets, Security Groups and other elements of the AWS environment to prepare for automated deployment of CyberArk solutions.

CyberArk Conjur - A library of validated integrations with CI/CD tools

October 17 / 2PM EST

Join us for Part 2 of our OTFL DevOps Series: Jody Hunt and Evan Litwak

:

In Part 2 of our DevOps series, we’ll demonstrate how developers can integrate Conjur into their projects with minimal effort.  In order to maintain the software delivery pipeline integrity and to help reduce security risks associated with unprotected privileged credentials embedded into applications, CyberArk Conjur immediately incorporates and mirrors privileged account security policies consistently across the DevOps ecosystem. Attend this session to learn how the CyberArk Conjur Solution:

  • Secures Build Products & CI/CD Tools
  • Provides RESTful API support for automated account provisioning of build products with orchestration tools
  • Removes credentials from code/configuration files
  • Reverts credentials back in case of disruption
  • Authenticates CI/CD tools, images and build product to maintain pipeline integrity
  • Enables credential-protected configuration and orchestration process

Building and Securing Cloud Workloads with AWS and CyberArk

October 24 / 2PM EST

Automating in AWS… with AWS: Andy Givens, CyberArk and Scot Ward, Amazon Web Services

:

Andy Givens.jpg
Amazon has set the stage for an evolution in cloud computing. Not only providing a low cost environment to run infrastructure, but by delivering services consumable directly by your application builders. But security of the cloud is a shared responsibility, and in a developer-centric world, organizations must provide security tools that entice developers to build securely, and make it easy to do so. Join speakers from CyberArk and AWS to learn how we work together to help organizations secure their application delivery and management.

The Personal Privileged Users: How to Manage Named Administrators

November 7 / 2PM EST

Mitigate the high risk that expose these users: David Higgins and Lars Melandar

:

David Higgins.jpg Lars jpg.jpg


Personal Privileged Users are Strong Named accounts that are owned by individuals in the organization. They could be Domain users that are member of the strongest groups in the ActiveDirectory, such as “Domain Admins”, but they could also be local users with highest permissions on Operating Systems including Unix/Linux and also on Corporate Business Applications.

This session will explore why the Personal Privileged Users are under the highest risk in your organization and how to mitigate those risks.

CyberArk and ServiceNow Integration: Privileged Account Security at Lightspeed

November 14 / 2PM EST

Managing Privileged Accounts in ServiceNow Discovery, Geneva, and Helsinki: Pete Danner, CyberArk

:

Pete Danner.jpg
To maintain and repair IT systems and applications, tech support users need access to all types of privileged accounts. The CyberArk-ServiceNow integration is important as it provides privileged security protection related to tickets that require administrative access to IT infrastructure when backend systems require troubleshooting. This secures the credentials of privileged users who are accessing systems to fix reported issues.

ServiceNow Discovery software integrated with CyberArk Application Identity Manager provides organizations secure discovery and assessment based on privileged credentials that are securely stored and managed by the CyberArk solution. MID Server integration with the CyberArk vault enables Orchestration, Discovery, and Service Mapping to run without storing any credentials on the instance.

Attend this webinar to learn how this partner solution helps secure and manage privileged accounts in ServiceNow.

Proofpoint & CyberArk: Detect, Prioritize and Block Attacks from Escalating on Privileged User Machines

December 5 / 2PM EST

Gain real-time threat insights using rich evidence collection for quick & effective investigation: Ben Derr

:

Chris Anderson.jpg

Learn how you can identify your environment’s privileged account related risks, detect potential abuse and misuse of privileged accounts, and place the essential security controls from your endpoints all the way up to your critical assets.

Learn more about the integrations between Privileged Threat Analytics, Privileged Session Manager, and Endpoint Privilege Manager which will enable your security teams to effectively respond to these risks.

CyberArk & ForeScout Secured: enables an in-depth credential-protected discovery process.

August 22 / 2PM EST

See Devices. Enforce policy-based control of these devices. Secure the Privileged Access.: Vishal Patel

:

vishal patel.jpg

Learn how the CyberArk-ForeScout CounterACT™ integration relieves the administrator of the responsibility of managing privileged account credentials. This is done by securing and rotating credentials on endpoints, servers and network devices that ForeScout CounterAct monitors/accesses.

We’ll review:

  • Discovery – how ForeScout CounterAct discovers new endpoints that CyberArk isn’t currently managing and provides that information to the analyst. The analyst can then determine whether or not the endpoint should be added to the vault or blocked.
  • Alerts: ForeScout CounterAct receives alerts from PTA and allows you to take immediate action on an endpoint that appears to be compromised
  • ForeScout CounterAct will also be able to identify if CyberArk Endpoint Privilege Manager has been installed on an endpoint and if it’s running. If not, ForeScout CounterAct can enable CyberArk Endpoint Privilege Manager.

Strengthening Machine Identity Protection – A Combined Venafi and CyberArk Application Identity Manager Solution

September 12 / 2PM EST

Perform sensitive renewal, replacement and rekey operations without administrator involvement: Brian Durkin (Venafi) Joe Garcia and Kevin Ross (CyberArk)

:

Kevin Ross.jpg

As part of your SSL/TLS certificate lifecycle management process, Venafi uses privileged credentials stored in the Venafi solution. Based on security and operational needs, CyberArk and Venafi developed a joint integration to automatically protect and manage these credentials in CyberArk, making them available to Venafi, as needed, based on organizations’ security policy. Join us and learn how to:

  • Securely store privileged credentials used by Venafi in the CyberArk solution
  • Automatically rotate credentials used by the Venafi solution
  • Automatically perform credential- protected certificate renewal and replacement operations

Curse of the typo! Automate repeated tasks to improve efficiency and reduce risk around user mistakes

September 19 / 2PM EST

Automate privilege tasks to avoid user error and costly outages: David Higgins

:

David Higgins.jpg

Daily repetitive tasks can be inadvertently damaging to a business caused by things human error (typos!) and abuse of privileged access (insider threats!). Automated task management, both in the cloud and on-premises, safeguards your remote vendors and internal users alike by automating manual sometimes critically sensitive privileged tasks while simultaneously improving workflow productivity.

Join this session to see how CyberArk can automate an array of regular tasks with a single click to establish user accountability and better protect your environment.

How Attackers are Using Domain Fronting to Abuse Content Delivery Networks (CDNs)

September 28 / 2PM EST

A Special Red Team OTFL Webinar: Shay Nahari

:

In this OTFL session, Shay Nahari, CyberArk’s Red Team lead, will present a new technique for domain fronting, which enables attackers to abuse Content Delivery Networks (CDNs) to mask malware command and control (C2) traffic. While many CDNs are potentially impacted, Akamai is one of the largest. During our research we identified tens of thousands of high reputation domains served by Akamai’s CDN that can be used for domain fronting.

This research demonstrates a new technique for hiding a C2 channel completely within a CDN. We will show POC tools that utilize this technique.

Security that Moves At DevOps Velocity

October 3 / 2PM EST

Join us for Part 1 of our OTFL DevOps Series: Jody Hunt and Evan Litwak

:

With the velocity of DevOps, in many cases companies are rolling out applications that fall outside of their normal stringent security policies. Business units are accepting that risk, because in companies where security stop applications rolling out, they lose competitive advantage, despite staying relatively risk free. What is needed is 1) for security, a tool set that allows them to extend our trust networks into a next gen I.T environment without inhibiting the speed/velocity of the cloud and DevOps teams; and 2) for DevOps/cloud teams, you want to be able to move at speed, without being concerned with manual security processes at every turn.

Attend Part 1 of our OTFL DevOps series to learn how CyberArk Conjur helps DevOps teams to secure their secrets, machine identities, and users in highly dynamic DevOps environments at scale

CyberArk Conjur - A library of validated integrations with CI/CD tools

October 17 / 2PM EST

Join us for Part 2 of our OTFL DevOps Series: Jody Hunt and Evan Litwak

:

In Part 2 of our DevOps series, we’ll demonstrate how developers can integrate Conjur into their projects with minimal effort.  In order to maintain the software delivery pipeline integrity and to help reduce security risks associated with unprotected privileged credentials embedded into applications, CyberArk Conjur immediately incorporates and mirrors privileged account security policies consistently across the DevOps ecosystem. Attend this session to learn how the CyberArk Conjur Solution:

  • Secures Build Products & CI/CD Tools
  • Provides RESTful API support for automated account provisioning of build products with orchestration tools
  • Removes credentials from code/configuration files
  • Reverts credentials back in case of disruption
  • Authenticates CI/CD tools, images and build product to maintain pipeline integrity
  • Enables credential-protected configuration and orchestration process

Building and Securing Cloud Workloads with AWS and CyberArk

October 24 / 2PM EST

Automating in AWS… with AWS: Andy Givens, CyberArk and Scot Ward, Amazon Web Services

:

Andy Givens.jpg
Amazon has set the stage for an evolution in cloud computing. Not only providing a low cost environment to run infrastructure, but by delivering services consumable directly by your application builders. But security of the cloud is a shared responsibility, and in a developer-centric world, organizations must provide security tools that entice developers to build securely, and make it easy to do so. Join speakers from CyberArk and AWS to learn how we work together to help organizations secure their application delivery and management.

The Personal Privileged Users: How to Manage Named Administrators

November 7 / 2PM EST

Mitigate the high risk that expose these users: David Higgins and Lars Melandar

:

David Higgins.jpg Lars jpg.jpg


Personal Privileged Users are Strong Named accounts that are owned by individuals in the organization. They could be Domain users that are member of the strongest groups in the ActiveDirectory, such as “Domain Admins”, but they could also be local users with highest permissions on Operating Systems including Unix/Linux and also on Corporate Business Applications.

This session will explore why the Personal Privileged Users are under the highest risk in your organization and how to mitigate those risks.

ABOUT CYBERARK

CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world's leading companies — including 45% of the Fortune 100 — to protect their highest-value information assets, infrastructure and applications.