Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Wednesday, May 12  |  3:00 PM (EDT) / 3:00 PM (CET) / 11:30 AM (SGT)


A Toolset to Protect Against the Most Advanced Threats


Take a closer look at the mitigation tools used by the ‘Blue Team’ to fend off five major breaches in our Attack & Defend Virtual War Room Experience.

In this third installment in the Attack & Defend webinar series, we will spend 30 minute’s reviewing the underlying tooling capabilities demonstrated in the defense simulation. The combination of preventive and detection controls and tools are an integral part to any Defense-in-Depth security strategy – and are critical to mitigating the risk of a major breach. We will break down specific tools that address:

  • Credential management to secure both human and non-human user access
  • The enforcement of the principal of least privilege across Windows, NIX and cloud targets
  • Establishing credential boundaries and implementing privileged session management
  • The ability to detect, alert and respond to high-risk/anomalous behavior

SAVE THE DATE

Date: 12th May
Time: 3:00 PM (EDT) / 3:00 PM (CET) / 11:30 AM (SGT)
Running time: 30 mins + Q&A

Presenters:
David Higgins, Technical Director, CyberArk
Chris Maroun, Sr Director, Identity Security Solutions Strategy
Brandon Traffanstedt, Sr Director, Global Technology Office


REGISTER NOW

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.