Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)


LIVE Webinar

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
  • Wednesday, May 12
  • 8AM ET / 2PM CEST
    2PM SGT
    2PM ET / 11AM PT

Modern threats and recent incidents, such as the SolarWinds digital supply chain attack, are further proof that identity has become the new security battleground and that an “assume breach” mentality is a critical starting point to developing an effective security strategy. In this panel discussion, we bring together three leading executives, who have decades of experience in this field, to provide CISOs and security executives with lessons learned and recommendations on Zero Trust models.

Topics covered will include:

  • How the risks around privileged access are changing as users and resources are increasingly outside the corporate network,
  • What techniques attackers are using to try to gain privileged access,
  • How organizations can adopt a Zero Trust approach by moving toward comprehensive Identity Security.


Laura Robinson

Chair of CISO View Research Panel, Principal Analyst, Robinson Insight

Laura collaborates with the Global 1000 CISO community to create advisory reports and industry meetings that address CISOs’ shared challenges. As Chair of the CISO View Research Panel, she brings together a group of industry leading CISOs from the Global 1000 to develop peer-to-peer guidance on the topic of protecting privileged access.

In this panel discussion, Laura will share insights from the 2021 CISO View research “Protecting Privileged Access in a Zero Trust Model”.

Corey Williams

Head of Identity Security Marketing, CyberArk

Corey is the Head of Identity Security Marketing at CyberArk, and the former Vice President of Marketing for Idaptive. Prior to Idaptive Corey served as an executive in Products and Marketing for more than a decade at Centrify where he was the visionary product manager behind the set of products that were ultimately spun out of Centrify to become Idaptive including leading SaaS services for Single Sign-on (SSO), Adaptive Multi-factor Authentication (MFA), endpoint and mobile context, and User Behavior and Risk Analytics (UBA).

In this panel discussion, Corey will share insights about the evolution of Identity Security.

Shay Nahari

VP of Red Team Services, CyberArk

Shay Nahari is the VP of Red Team services of CyberArk and brings more than 15 years of experience in cybersecurity and telecommunications. He specializes in working with global enterprises to improve their ability to detect and react to targeted attacks using adversary simulation and advanced real-life tactics, techniques, and procedures (TTP).

In this panel discussion, Shay will provide key insights and recommendations related to emerging modern threats.

Moderated by:

Corey O'Connor

Director of Product Marketing, CyberArk

Corey O’Connor is the Director of Product Marketing at CyberArk responsible for all Privileged Access Management solutions within the Identity Security portfolio. His experience through multiple product marketing roles both in security and data storage and management enables him to have a strong understanding of the continuous changes in privileged access security.

In this panel discussion, Corey will be moderating the dialogue.


Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.