CyberArk to Address Advanced Cyber Threats at GTRA Technology Council Meeting

Panel Presentation and Roundtable to Help Government IT Leaders Reduce APT Exposure By Protecting Privileged Accounts

Cambridge, Md. – May 31, 2013 – CyberArk today announced details of its upcoming participation at the GTRA June Technology Council Meeting. CyberArk’s Adam Bosnian will join industry leaders on the “Sustainability in the New IT Ecosystem: Critical Success Factors for Today & Key Preparations for Tomorrow” panel to address the theft, misuse and exploitation privileged accounts, a key tactic in each phase of an Advanced Persistent Threat (APT) attack cycle. In addition, CyberArk will host a roundtable dedicated to the discussion of the importance of managing privileged accounts in accordance with NIST 800-53 Rev 4. CyberArk’s Privileged Identity Management Suite was also nominated for a GOVTek Award for Best Security Solution. Winners will be announced on June 2 at the GOVTek Awards Gala.

Who:

Adam Bosnian, Executive Vice President, Americas, CyberArk

David Lingenfelter, Fiberlink Security Officer, Maas360

Wallace Sann, Director, Systems Engineering, Forescout

Steve Antone, VP, Federal Solutions, Lumension

MODERATOR: Parham Eftekhari, EVP, Research & Co-Founder, GTRA

What:

Panel: Sustainability in the New IT Ecosystem: Critical Success Factors for Today & Key Preparations for Tomorrow

Roundtable: The Impact of Automating Privileged Controls to Address NIST 800-53 Rev 4 and Meet the Increasing Advanced Threat Landscape

In the CyberArk session, attendees will participate in a dialogue on the existence, prevalence and risk of unmanaged privileged accounts in a traditional IT organization. The conversation will focus on how best to define, implement and track controls in order to stop inadvertent or malicious misuse of these powerful accounts and pathways. The risk posed by unmanaged, powerful privileged accounts, from both a compliance and a pure security perspective, is magnified by the anonymity of the privileged user or application and the opacity of the corresponding actions. Privileged controls, when properly designed and made operational, directly reduce the overall security risk an organization faces from advanced attacks while ensuring continuous usage of the recommended controls surrounding privileged accounts that are detailed extensively in Rev 4 of the NIST Special Publication 800-53.

When:

Monday, June 3, 2013 at 4:30 p.m. ET

Where:

Chesapeake A, Hyatt Regency Chesapeake Bay, Cambridge, Md.

For updates from the meeting follow CyberArk on Twitter: @CyberArk

About CyberArk
CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 45 percent of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout EMEA and Asia Pacific and Japan. To learn more about CyberArk, visit cyberark.com, read the company blog, cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at facebook.com/cyberark.

###