Examining security risks related to privileged credentials: Learn how to proactively secure, protect and monitor privileged credentials in RPA
Please note we have made some changes to the OTFL webinar schedule.
Due to many requests to offer these sessions to accommodate different time zones, the cadence of the program has been modified. Webinars will be offered the first Tuesday of each month at both 9:00 am EST and 2:00 pm EST.
CyberArk's On The Front Lines webinar series covers a variety of hot topics related to security exploits involving privileged accounts. Our security experts will review a potential threat and demonstrate CyberArk technology and best practices for mitigating risks.
Webinars will be offered the first Tuesday of each month at both 9:00 am ET and 2:00 pm ET.
Webinars will be offered the first Tuesday of each month at both 9:00 am ET and 2:00 pm ET.
Mind your Ps and Qs: Secrets Management for Applications, Tools, Containers and DevOps
April 9th / 9am ET or 2pm ET
Presenters: Joe Garcia, Strategic Solutions Engineer & James Creamer, Strategic Solutions Engineer
Be on your best behavior, the saying goes. In this session, we’ll highlight use cases and best practices for comprehensive privileged access as well as credential and secrets management for widely used applications, third party tools, containers and DevOps environments.
The CyberArk Application Access Manager, which combines CyberArk Application Identity Manager and Conjur Enterprise helps organizations to control, manage and audit non-human privileged access for a wide range of applications including in-house developed, COTS and dynamic containerized applications.
Fortunately, the security principles that protect human credentials can also apply to non-human credentials. However – due to higher performance and scale requirements and the special technologies required to strongly authenticate applications or code and other factors – protecting non-human credentials requires its own solution. Least privilege, role-based access controls, credential rotation, management and audit can all be applied to non-human credentials.
Key take-away points include:
- Clear understanding of machine vs application identity
- Benefits of agentless and agent-based solutions
- When to use which credential and access provider
- Next steps to take to secure your applications