language_icon Kuala Lumpur, MY

CyberArk Identity Security Conference - Kuala Lumpur

Marketo_400x300_Robot1.png

Registration Closed


Calendar icon Wednesday, 14 August
Clock icon 12:00PM - 5:00PM SGT

CyberArk is taking the Identity Security conversation to Kuala Lumpur.

We look forward to seeing you there!

Join us and your industry peers in Kuala Lumpur on 14 August, Wednesday, to discuss the latest developments in attacker innovation, and most importantly, how to defend against them. With identity as the #1 attack vector, every identity across your organization must be secured without affecting user productivity. At the event, you’ll walk away informed, inspired and equipped to take your Identity Security program to the next level.

Who should attend and why?

CyberArk Identity Security Conference is for CyberArk customers, partners and anyone who wants to strengthen their organization’s security posture through identity security. You’ll obtain essential knowledge about CyberArk products and solutions, as well as emerging trends in attacker innovation, and the latest technologies and best practices to protect your organization from identity-based cyberattacks.

  • Thought-provoking threat research and analysis from CyberArk Labs
  • One-on-one meetings with CyberArk product experts
  • Networking with peers and industry luminaries

Location

CyberArk Identity Security Conference - Kuala Lumpur will take place at Hilton Kuala Lumpur, Level 6, Sentral Ballroom 2, next to KL Sentral, offers easy access to KLIA Ekspres, KTM, LRT, MRT, and monorail for exploring top tourist spots.


Agenda

12:00

Registration and Lunch

12:45

Welcome Address

13:00

New Threats. New Paradigms.
As the threat landscape continues to intensify, relying on traditional models to secure identities is a losing proposition. In this session we will challenge conventional thinking and explains why we must rethink our security models to defend against identity-based cyberattacks. In today's world, characterized by the proliferation of identities and the double-edged sword of AI, every organization must embrace a set of new paradigms to secure every user - human and machine.

13:30

Innovation Roadmap: Solutions for Securing Every Identity
Ever wonder how CyberArk solutions defends against some of today's most prevalent cyber threats? In this session, we will share about the CyberArk Identity Security Platform's vision and roadmap. Learn how we are innovating to secure every identity - spanning the Workforce, IT, Developers, and Machines.

14:00

When AI meets Security. Security of AI, by AI, for AI.
In today’s swiftly evolving digital landscape, AI is a double-edged sword, used by bad actors to get past security guardrails, while being adopted by forward-thinking organizations for its powerful defense capabilities. When AI is applied strategically, it is a transformative technology that can solve real customer problems. This session deep dives into CyberArk's strategic vision for leveraging AI to enhance identity security. You'll hear about cutting-edge cybersecurity research and gain an in-depth understanding of CyberArk® CORA™ AI, a breakthrough technology that supercharges the CyberArk Identity Security Platform. We'll explore how CyberArk helps secure all identities within AI-driven environments, showcasing real-world use cases that demonstrate the power of CyberArk's AI-powered solutions.

14:30

Redefining Enterprise Access
As our business evolve to increasingly adopt SaaS and Web based applications, this broadens our traditional understanding of Privilege Identities in the organisations. With this evolution. any identity under the right conditions can become Privilege. CyberArk Workforce Platform allows organisations to extend frictionless privilege controls to the workforce where required. This session helps to understand how the CyberArk Workforce Platform can modernise workforce access by decreasing friction to the users and minimising organisation's risk of breach.

15:15

PM Coffee Break

15:45

Modernize Your Privilege Access Management
The IT persona represents a paradigm shift in cybersecurity strategies tailored for modern IT environments. This persona embodies a proactive approach to identity security, emphasising privileged access management (PAM) as a cornerstone. The IT persona also champions a user-centric model, prioritising seamless user experiences without compromising security protocols. By leveraging cutting-edge technologies and real-time threat intelligence, CyberArk's new IT persona empowers organisations to navigate the complexities of digital transformation securely and efficiently.

16:30

Security Your Developers Will Love: Maintain Velocity with Zero Standing Privileges
This session explains the importance of securing developers' access by introducing the concept of zero standing privilege and its role in reducing risk for cloud access. We will cover a developer's perspective on secure daily and production access, and explore how you can automate and secure your Infrastructure as Code (IaC) and automation tools, concluding with key takeaways

17:15

Securing Machine Identities: Why Securing Human Identities is Not Enough
Securing machine identities is critical for maintaining trust and protecting data against cyber attacks, thus ensuring business continuity and also meeting compliance requirements. This session will begin with a fundamental understanding of machine identities, highlighting their rapid growth and the risks of neglecting their protection. We will explore the common challenges enterprises face and discuss solutions and best practices for managing machine identities effectively across the organization.

18:00

Lucky Draw and End of Event

About CyberArk
CyberArk (NASDAQ: CYBR) is the global leader in identity security. Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud environments and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.