• Webinar Series: On The Front Lines

    Register for our new sessions, held Tuesday’s at 2pm ET

    April 25 – Enhancing Security in Critical Infrastructure: Databases

    May 2 – Unix Security: Stop Leaving Your Most Sensitive Assets and Credentials at Risk

    May 9 – Linux Security: Securing SSH Keys and other Privileged Credentials in the Cloud

    May 16 – CyberArk and SailPoint Securing Together: Identity Access Managemetn and Privileged Account Security

    Learn more
  • CyberArk Logo

    April 24, 2017

    Mission Possible: Executing a 30-Day Sprint to Protect Privileged Credentials

    Monday, April 24 2:00pm EDT

    Learn more
  • CyberArk Logo

    April 27, 2017

    Best Practices for Preventing Industrial Control System Ransomware Through Privilege Security Controls

    April 27, 2017 11:00 am PT | 2:00 pm ET

    In April 2016, a small U.S utility company suffered a ransomware attack that included a demand for $25,000. The eventual cost of that attack – according to public records – was almost $2M. If the cost of a ransomware attack in the corporate network of a small utility can cost $2M, what are the implications of an attack in the ICS of a large utility?

    Attend this webinar and understand how a holistic approach to combatting ransomware starts with blocking and containing attacks at the endpoint to reduce the risk of information being encrypted and held for ransom, but also requires a more expansive privileged account security strategy that prevents propagation of this specialized malware into the ICS environment.

    We’ll explain how to improve remote access security in industrial environments and mitigate the security risks associated with the increased connectivity between IT and OT, including:

    – Blocking and containing attacks at the endpoint

    – Improving remote access security in industrial environments

    – Mitigating the security risks associated with the increased connectivity between IT and OT

    Learn more
  • May 1, 2017 - May 3, 2017

    North America CACS 2017

    Las Vegas, NV – The North America CACS Conference is ISACA’s premier conference for Audit/Assurance, COBIT, Compliance, Risk, Security, and Strategy/Governance professionals. Don’t miss the opportunity to earn up to 39 CPE hours and be a part of the top conference for IS audit and security professionals!

    Learn more
  • May 2, 2017 - May 4, 2017

    Red Hat Summit

    Boston, MA

    Learn more
  • CyberArk Logo

    May 4, 2017

    The future of IAM and its role in today’s digital economy

    Webinar co-hosted by KPMG, Cyberark and SailPoint In a study conducted by Pierre Audoin Consultants (PAC), sponsored by KPMG International, CyberArk and SailPoint, research shows that a new wave of investments in IAM is being directed towards enabling digital transformation initiatives. These investments are directed not just towards mitigation of risk but also towards better governance of high risk assets and digital identities, managing and automating privilege access lifecycles, and through standards-based integration to critical services that enable the transformation and delivery of digital services.

    Learn more
  • May 15, 2017 - May 19, 2017

    IT Web Security Summit

    South Africa

    Learn more
  • June 12, 2017 - June 15, 2017

    Gartner Security & Risk Management Summit

    National Harbor, MD – The premier gathering of security, risk management and business continuity management leaders, Gartner Security & Risk Management Summit 2017 delivers the insight you need to guide your organization to a secure digital business future. The comprehensive agenda addresses the latest threats, flexible new security architectures, governance strategies, the chief information security officer role and more. It’s a unique opportunity to reinvent your approach to security and risk for the digital age, based on Gartner’s trusted independent research and practical recommendations.

    Learn more
  • July 26, 2017 - July 27, 2017

    Black Hat USA 2017

    Las Vegas, NV – Black Hat is the most technical and relevant global information security event series in the world. For more than 18 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry.

    Learn more