Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

IT Audit & Compliance: Practical and Strategic Considerations

Live Webinar

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Americas: Wednesday, September 14, 2022  |  2:00pm EDT
EMEA: Wednesday, September 14, 2022  |  1:00pm CEST
APAC: Wednesday, September 14, 2022  |  1:00pm SGT

Digital transformation is all fun and games - until there's an audit.

Cloud migrations and DevOps initiatives are creating new possibilities for global IT organizations. In spite of changing regulations, with IT audits, the basics are still the basics. Auditors will still zero in on discovery and management of privileged accounts and identities, especially for known pain points like service accounts.

So how can you stay practical and check the Privileged Access Management and Identity Security boxes, while building a strategic plan to comply with future audits?

Join global Identity Security leaders from CyberArk and Accenture for this fireside chat covering:

  • Practical considerations for handling regulatory changes like PCI DSS and CCPA
  • Preparing for auditor innovation to address changes in the IT landscape
  • Tying audit and compliance preparation with Migrations to AWS, Azure and GCP and more...


Our Presenters


cyberark-100-90.png

Damon McDougald

Global Digital Identity Lead @ Accenture

Barak Feldman

Senior VP, PAM and Identity Security @CyberArk

For your convenience, the webinar will run live in English with auto-generated subtitles in Japanese, Mandarin, Spanish, Portuguese, Italian, German and French.

REGISTER NOW

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.