Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

2023 Schedule and Session Descriptions

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Session 1 - Now on Demand

How Dark Web Credentials Lead to a Software Supply Chain Attack

In this session, our team will simulate a software supply chain attack in which an attacker uses credentials obtained on the dark web to breach a managed service provider (MSP) and execute ransomware on an unsuspecting customer.

Session 2 - Now on Demand

Underestimated Risk: Common Cloud and DevOps Misconfigurations

We’ll demo some of the most common misconfigurations in Cloud and DevOps environments that attackers can exploit and show you how to effectively mitigate risk.

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

Think Like an Attacker. Stay One Step Ahead.

Organizations are experiencing an explosion of human and machine identities, driven by digital initiatives and rapid innovation. This in turn has significantly increased exposure to ransomware, software supply chain attacks and other threats, giving rise to a new generation of cyber criminals.

Cyber criminals continuously seek to make their attacks more resilient, more disruptive and harder to counter. Harder yes, but not impossible. Our extensive security experience is rooted in protecting privileged access, a practice that must extend beyond the IT admin to all identities – human and machine.

What to Expect Each Session

For a reality-based experience with timely defense insights, we tap current CyberArk Labs research on threats seen and experienced in the wild, as well as insights gained from actual breaches our incident responders have addressed. We will simulate a head-to-head battle.

  • CyberArk Technical Evangelist and resident biohacker Len Noe will demonstrate an attack step by step. Learn about the most common tools, tactics and procedures (TTPs) and see how vulnerable you may be to a particular attack.
  • CyberArk Labs Global Evangelist Andy Thompson will demonstrate security best practices and show how organizations can reduce risk by managing and securing identities.

To get the most from this series, we suggest participants have one of the following roles:

  • CISO/(Cyber) Security Manager
  • (Cyber) Security/IT Architect
  • (Cyber) Security Professional
  • IT/Security
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

WATCH NOW

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.