Webinar | 1 CPE Credit
Sicherung von Ansible Automation-Umgebungen mit CyberArk
Sie sind auf der Suche nach einer wirksamen Möglichkeit zur Sicherung der Ansible-Umgebungen Ihres Unternehmens? In diesem Webinar erfahren Sie, wie Sie CyberArk als zentrale Sicherheitsplattform für Ihre Ansible-Bereitstellungen nutzen können. Wir stellen Use Cases und Best Practices für einen umfassenden privilegierten Zugriff vor und erläutern Möglichkeiten für die Verwaltung von Anmeldeinformation und vertraulichen Zugangsdaten.
Wichtige Themen des Webinars:
- Überblick über die gemeinsamen Herausforderungen bei der Sicherung von Automatisierungsumgebungen
- Vorteile der Verwendung von CyberArk zur Erweiterung der nativen Möglichkeiten von Ansible
- Beispiel für den Einsatz von CyberArk zur Sicherung von Ansible-Deployments
WEITERE TERMINE FOLGEN!
How to Simplify Secure Access for Remote Users and Protect Critical Internal Resources
Tuesday, April 14 at 9:00 a.m. EDT and 2:00 p.m. EDT
1 CPE Credit
Remote users –both employees and vendors – typically need access to critical systems to manage data, patch or upgrade systems, etc., in order to keep business operations running smoothly. Manual and/or patchwork processes can dramatically increase risk as well as cause operational headaches.
Join us to learn how to mitigate the security risks associated with providing remote third party vendors and employees with access to your most critical internal resources.
Zero Trust: How to Mitigate Risk from Remote Vendors
Thursday, April 23 at 10:00 a.m. BST
Organization relies on remote vendors who require access to critical internal systems. Securing these has become a regulatory problem and a cyber concern. Join us to find out about our innovative approach to securing remote vendors, based on a zero trust framework. One SaaS offering, allowing remote vendors to access critical internal systems without the need of VPNs, agents or passwords.
A Least Privilege in a Cloud-First World
Tuesday, June 16 at 12:00 PM EST
The cloud makes a lot of things easier. Unfortunately, over-permissioning users is one of those things. In this session we’ll discuss: tactics to discovering and remediating privilege faux paus in your cloud infrastructure.
How to Stop Your Windows and Mac Workstations from Being Your Weakest Link
Tuesday, April 28 at 1:30 p.m. SGT (GMT +8)
Whether they are Windows-based or MacOS, workstation-targeted attacks revolve around privilege. As attackers seek a foothold in your organization, they aim to steal credentials, manipulate applications and move laterally across the network.
In this session, we will demonstrate common attacks against Windows and Mac workstations. We will also share how CyberArk solutions can be deployed to stop lateral movement from workstations.
Privileged Access Management 101: Changing Your Security Game
Tuesday, April 28 at 2 PM CET / 12 PM GMT
As organizations around the world grapple with unprecedented circumstances, opportunistic cyber attackers are making moves. This webinar will show you how to outplay attackers by changing the game where it matters most – securing privileged access.
You’ll learn: What privileged access is, where it exists, and why it is under attack. The anatomy of the most common attacks on privileged access. Top PAM use cases. How to deploy PAM in a remote environment.
Best Practices for Securing Cloud Based Applications and Infrastructure
Wednesday, April 29 at 1:30 p.m. SGT (GMT +8)
In this session, you will have the unique opportunity to learn from real-world scenarios related to privileged access security in cloud environments. We provide insights from lessons learned securing commercial SaaS applications, cloud infrastructure and internal apps deployed in the cloud.
Getting the Word Out: Developing a Privileged Access Security Information Hub
Tuesday, May 5 at 9:00am EDT / 2:00pm EDT
Webinar | 1 CPE Credit
A critical component of successful communication is a “Privileged Access Security Information Hub,” an all-in-one intranet webpage where the privileged access team can share detailed information, updates, training, events and more!
Join this session to learn what goes into a strong Privileged Access Security Information Hub and how it can impact the success of your PAM program whether you are just getting started or further along.
Ransomware: How Privileged Access Management Strategy Mitigates Risks
Thursday, May 7 at 10:00 a.m. BST
Learn how risks associated with the ransomware rise can be mitigated by implementing a comprehensive Privileged Account Management strategy.CyberArk solution enables to mitigate the risk by implementing least privilege approach and credential theft protection to prevent on the attack on the machines where it lands, combined with privileged credential rotation and isolation to block lateral movements and prevent the spread of the attack.
Discover and Secure your Dynamic Attack Surface
Thursday, May 14 at 1:00 p.m. EDT
Rapid7 and CyberArk offer integrations to provide the awareness, assessment and actions that you need to keep your organization secure.
Join us to learn how to assess your environment to discover potentially unmanaged endpoints and systems and automatically add them to be managed within CyberArk.
Successful and Simple Privileged Access Management Program as a Service
Wednesday, May 20 at 10:00 a.m. BST
Privileged Access Management has been ranked by top analysts as a top CISO priority to secure enterprise IT environment. During this webinar, you will discover how to mitigate one of your most important IT risks with a guided success plan to ensure results in a controlled timeframe and budget with CyberArk Privileged Cloud.
Secure Developers’ Environment While Ensuring Developers Top Level Productivity
Thursday, June 4 at 10:00 a.m. BST
With the adoption of DevOps processes and Cloud environment, digital transformation has turned developers into some of the most powerful IT users within your organization, and attackers have started to specifically target developers. During this webinar, you will learn how to secure DevOps environments while avoiding risks associated with credential thefts, privileged escalations and not compromising the success that is transforming your business.
Best Practices that Protect Workstations
Tuesday, June 9 at 9:00 a.m. EDT and 1:00 p.m. EDT
Learn about best practices for protecting your organization from advanced attacks including tips related to getting started with a discovery process, implementing policies to protect credentials and how to effectively mitigate risks of Ransomware.
See how CyberArk Endpoint Privilege Manager can be used to secure workstations.
Red Team Insights on Pandemic Driven Security Vulnerabilities
Tuesday, June 16 at 1:30 p.m. SGT/ GMT +8
Organizations made dramatic infrastructure changes to support a move to a nearly 100% remote workforce due to the COVID-19 pandemic.
Security boundaries have changed significantly in parallel with less rigid security controls. This leads to increased risks proportionate to the increased attack surface. Join us for insights from our Red Team.
Underpinning your MultiCloud Strategy with Privilege Access Management
Tuesday, June 16 at 2:00 p.m. BST
Every cloud has a privilege lining, and privilege is the first real challenge of building an effective and scalable multi/hybrid cloud strategy moving forward. Learn how to make privilege access management an enabling service as you onboard additional cloud providers, understand how you can realize increased operational efficiency and decreased risk all through consistently managing privilege.
Best Practices for Securing Cloud Based Applications and Infrastructure
Wednesday, June 24 at 10:00 a.m. BST
In this Session, you will have the unique opportunity to learn from real-world scenarios related to privileged access security in cloud environments. We provide insights from lessons learned securing commercial SaaS applications, cloud infrastructure and internal apps deployed in the cloud.
5 Privileged Access Management (PAM) Use Cases Explained
Tuesday, July 7 at 10:00 a.m. BST
Privileged accounts can be found in every networked device, database, application, and server on-premises and in the cloud. Privileged users have the “keys to the kingdom” and, in the case of a cyberattack or data breach, privileged credentials can be used to cause catastrophic damage to a business.
During this session we will demonstrate based on 5 use cases how CyberArk can help you to secure your privileged accounts.
Protect against the Fundamental Nature of Ransomware
Monday, July 13 at 2:00 p.m. BST
As remote working becomes the new norm, the Endpoint is more exposed than it ever has been before. Unfortunately, exploiting the current global crisis, we have seen an increased and focused effort in Ransomware attacks. In this session, we review some past approaches to stopping ransomware and the challenges associated with them. Then look at a more holistic approach to securing the endpoint
Privileged Access Management Fundamentals: Secure Your Success
Tuesday, July 14 at 1:00 p.m. EDT
This webinar will show you how to improve your operational resilience and cyber security posture by focusing where it matters most – securing privileged access. Our presenters will discuss how privileged access can be secured in a convenient, as-as-service way that matches today’s digital reality and business environment.