Newsroom

CyberArk to Address Advanced Cyber Threats at GTRA Technology Council Meeting

May 31, 2013

Panel Presentation and Roundtable to Help Government IT Leaders Reduce APT Exposure By Protecting Privileged Accounts

Cambridge, Md. – May 31, 2013 – CyberArk today announced details of its upcoming participation at the GTRA June Technology Council Meeting. CyberArk’s Adam Bosnian will join industry leaders on the “Sustainability in the New IT Ecosystem: Critical Success Factors for Today & Key Preparations for Tomorrow” panel to address the theft, misuse and exploitation privileged accounts, a key tactic in each phase of an Advanced Persistent Threat (APT) attack cycle. In addition, CyberArk will host a roundtable dedicated to the discussion of the importance of managing privileged accounts in accordance with NIST 800-53 Rev 4. CyberArk’s Privileged Identity Management Suite was also nominated for a GOVTek Award for Best Security Solution. Winners will be announced on June 2 at the GOVTek Awards Gala.

Who:

Adam Bosnian, Executive Vice President, Americas, CyberArk

David Lingenfelter, Fiberlink Security Officer, Maas360

Wallace Sann, Director, Systems Engineering, Forescout

Steve Antone, VP, Federal Solutions, Lumension

MODERATOR: Parham Eftekhari, EVP, Research & Co-Founder, GTRA

What:

Panel: Sustainability in the New IT Ecosystem: Critical Success Factors for Today & Key Preparations for Tomorrow

Roundtable: The Impact of Automating Privileged Controls to Address NIST 800-53 Rev 4 and Meet the Increasing Advanced Threat Landscape

In the CyberArk session, attendees will participate in a dialogue on the existence, prevalence and risk of unmanaged privileged accounts in a traditional IT organization. The conversation will focus on how best to define, implement and track controls in order to stop inadvertent or malicious misuse of these powerful accounts and pathways. The risk posed by unmanaged, powerful privileged accounts, from both a compliance and a pure security perspective, is magnified by the anonymity of the privileged user or application and the opacity of the corresponding actions. Privileged controls, when properly designed and made operational, directly reduce the overall security risk an organization faces from advanced attacks while ensuring continuous usage of the recommended controls surrounding privileged accounts that are detailed extensively in Rev 4 of the NIST Special Publication 800-53.

When:

Monday, June 3, 2013 at 4:30 p.m. ET

Where:

Chesapeake A, Hyatt Regency Chesapeake Bay, Cambridge, Md.

For updates from the meeting follow CyberArk on Twitter: @CyberArk