CyberArk is taking the Identity Security conversation to London during IMPACT World Tour.
We look forward to seeing you there!

Join us and your industry peers in London on 13 June to discuss the ever-expanding attack surface, the latest techniques in identity-based cyberattacks, and innovations in Identity Security technology. You'll walk away informed and inspired to take your Identity Security program to the next level.

Who should attend and why?
CyberArk IMPACT is for anyone who wants to strengthen their organization’s security posture through Identity Security. You’ll obtain essential knowledge about CyberArk products and solutions, as well as emerging trends in Identity Security, including the latest technologies and best practices to protect your organization from identity-based cyberattacks.
  • Inspiring, informative and entertaining keynotes
  • Educational technical and business breakouts
  • Thought-provoking threat research and analysis from CyberArk Labs
  • One-on-one meetings with CyberArk product experts
  • Networking with peers and industry luminaries
...
...
Location
CyberArk IMPACT World Tour London will take place at 11 Cavendish Square, situated in the heart of London's West End. 11 Cavendish Square is within walking distance from Oxford Circus and Bond Street stations.

Agenda

Below is a snapshot of the agenda for the event. Check back often for updates.

08:30 - 9:30 Registration
09:30-09:40 Welcome
Alan Davidson, Sales Director UK&I
09:40-10:20 Identity is the New Attack Surface
Matt Cohen, CEO
10:20-11:00 How AI is Making Attackers Smarter, Faster and More Dangerous
Gal Zror, Cyber Research Group Manager
11:00-11:30 Coffee Break
11:30-12:15 Panel Discussion
David Higgins, Senior Director, Field Technology Office
12:15-13:00 Guest speaker
Greg van der Gaast
13:00-14:00 Lunch
14:00-14:40 Roadmap & Innovation
Amy Blackshaw, VP, Product Marketing
Breakout sessions
Track 1 Track 2
14:40-15:25 Best Practices for Securing AWS, Azure and Multi-cloud Environments
Josh Kirkwood
Get Started Protecting Application Identities
Kurt Sand
15:25-15:55 Break
15:55-16:40 Zero Day Challenges on the Endpoint
Aeron Leeding
Expand Your Identity Security Program with the CyberArk Blueprint
Elliot Wood
16:40-17:20 Software Supply Chain Security: ​Best Practices for Threat Mitigation
Gal Zror & Matt Scott
Modern Privileged Access: Rewriting the Script for an Identity Security Program
Przemek Dybowski
17:20-17:30 Final Closing Thoughts
17:30-19:30 Networking & Drinks Reception

Personal Information

Please complete registration with a valid business email address.