play_circle_filled Identity Security ProTalks

Bridging the Secrets Management Divide: From Traditional IT to Cloud-Native Without Silos

Hero Image
  • Calendar icon August 5 Calendar icon Americas: 2PM ET | EMEA: 3PM CET | APAC: 11AM SGT

Two perspectives. One strategy. Real-world secrets management across the modern stack.

Hardcoded credentials. Unmanaged Kubernetes Secrets. API keys scattered across CI/CD pipelines and serverless functions. As organizations adopt cloud-native tools and AI-driven workflows, secrets sprawl is intensifying—putting critical systems at risk.

In this fireside conversation, CyberArk’s Uzi Ailon and Matt Barker will explore how organizations can take a practical, unified approach to modern secrets management. Uzi brings deep experience working with Fortune 500 enterprises on securing infrastructure at scale. Matt brings a cloud-native lens, helping fast-moving teams secure modern workloads without slowing down development.

Together, they’ll unpack:

  • Where secrets sprawl originates—and why it’s hard to contain
  • How to balance agility and control across hybrid, multi-cloud, and cloud-native environments
  • How to integrate Kubernetes Secrets and AI workloads into a secure access strategy
  • How to bridge gaps between security, DevOps, and platform teams

Speakers:

Speaker Photo

Uzi Ailon

VP, Machine Identity Solutions, CyberArk
Speaker Photo

Matt Barker

VP & Global Head, Workload Identity Architecture, CyberArk

REGISTER NOW

About CyberArk
CyberArk (NASDAQ: CYBR) is the global leader in identity security, trusted by organizations around the world to secure human and machine identities in the modern enterprise. CyberArk’s AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. With CyberArk, organizations can reduce operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers and machines, to securely access any resource, located anywhere, from everywhere. Learn more at cyberark.com.