Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Security at Inception: Best Practices for Managing the Credential Lifecycle with REST APIs and Automation

Webinar

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Wednesday February 19, 2020  |  9am EST (15:00 CET) / 1pm EST (10am PST)
1 CPE Credit

The process of onboarding privileged credentials is a critical step in building a successful Privileged Access Management (PAM) program. However, many organizations complete this task as a human driven process, leaving it exposed to delays and errors. There is a better way. We’ll show you how to leverage APIs and automation to build security into the inception of privileged credentials.

In this session, you will learn:

  • How the REST API can be used to improve onboarding efficiency, data accuracy and security posture.
  • Recommended approaches for building automated credential onboarding and lifecycle management through the use of orchestration tools, request systems and scripts.
  • What resources are available for you to begin your automation journey.


Presenters:

James Creamer, Senior Strategic Solutions Engineer, CyberArk
Joe Garcia, DevOps Security Engineer, CyberArk



Earn CPE Credits

You can earn credit for this session as indicated. Attendees are responsible for submitting credit requests directly to relevant organizations as qualified. Proof of attendance provided upon request.


REGISTER NOW

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world's leading companies — including more than 50% of the Fortune 500 — to protect their highest-value information assets, infrastructure and applications.