CyberArk_Think Like An Attacker Bootcamp_Marketo Landing Page Banner_1280x350_Title.jpg
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Think Like an Attacker. Stay One Step Ahead.

Registration includes access to all 4 on-demand sessions


Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

TO DEFEND AGAINST A CYBERCRIMINAL, YOU MUST FIRST THINK LIKE ONE.

The Think Like an Attacker Bootcamp series offers four 20-minute on-demand virtual episodes that will take you inside the dark place that is the cybercriminals mind.

As a technology vendor and services provider, we at CyberArk also adopt the “Think like an Attacker” mindset. Hear directly from our own Red Team, Threat Research Labs experts, and resident White Hat Hacker as they shed light into how they uncover gaps and weakness, highlight common TTPs seen in real-world engagements, and discuss the future of the attack vector. Adopting this mindset will enable you to secure you organization and stay one step ahead of the threat actors.

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

FOUR EPISODES TO CHANGE YOUR MINDSET.

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
CyberArk_Think Like An Attacker Bootcamp_Marketo Landing Page Register2_860x500_Len.jpg
Episode 1

Meet Len Noe, CyberArk’s own cyborg. From crypto bionic chips to biosensing magnets, he’ll discuss what he’s done to turn himself into the attack vector and what you need to be thinking about in this new age of invisible attacks.  

CyberArk_Think Like An Attacker Bootcamp_Marketo Landing Page Register2_860x500_Brandon.jpg
Episode 2

Today’s cyber security strategy must secure access at all layers: from remote endpoints and devices to core databases and servers. As cyber-criminals become ever-more sophisticated, how do you secure your organization?

CyberArk_Think Like An Attacker Bootcamp_Marketo Landing Page Register2_860x500_Assaf and Emmanuel.jpg
Episode 3

Recent breaches have demonstrated attackers’ growing creativity, confidence, and precision. CyberArk researchers dig into code, explore available security research tools, and review mitigation steps so you can stay a step ahead.

CyberArk_Think Like An Attacker Bootcamp_Marketo Landing Page Register2_860x500_Shay.jpg
Episode 4

Multi-Factor Authentication (MFA) is rightfully considered a strong technical control for protecting against credential theft. Yet this Zero Trust building block is also susceptible to weak points. Gain insight into the attackers’ perspective.

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Who should attend?

Those responsible or involved in the development, implementation and monitoring of enterprise cybersecurity and IT risk management programs.


Speakers:

Len Noe - Global SE, Whitehat Hacker
Brandon Traffanstedt – Sr. Director, Global Technology Office
Shay Nahari – VP, Red-Team Services
Emmanuel Ouanounou – Cyber Researcher
Assaf Sion – Cyber Researcher

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)