DON’T MISS OUT!

Be a part of the world’s largest gathering of Privileged Access Security Professionals.

MEET OUR SPEAKERS

Guest Speaker

Felix Gaehtgens

VP Analyst, Gartner Analytics

Bennett Arron

Award-Winning Writer & Stand-Up Comedian

CyberArk Keynote Speakers

Rich Turner

Senior Vice President, CyberArk

Udi Mokady

Founder, Chairman & CEO, CyberArk

Karen Eldor

Vice President Product Management, CyberArk

Shay Nahari

Head of Red Team services, CyberArk

David Higgins

Technical Director, CyberArk

Yair Sade

Vice President Product Management, CyberArk

Customer Speakers

Manfredi Blasucci

Chief Information Security Officer, Auchan Retail Italia Group (Italian branch of Auchan SA), Italy

Frank van der Spek

Manager Security Office, Robeco, Netherland

Allyn Lindsay

Senior Security Technical Specialist, SKY, UK

Cristiano Ramponi

IT Architecture and Security Manager, Unipol Gruppo Finanziari, Italy

Andreas Waas

IT Cyber Security Center, Siemens Healthineers, Germany

Jean-Pierre Therrien

Sponsor for Privilege Access Management, Euroclear, Belgium

Partner Speakers

Mads Nørgaard Madsen

EMEA PwC PAM lead and Cyber Security lead Denmark, PwC

Ed Barry

VP of Business Development, Sailpoint

Dirk Geeraerts

Regional Sales Director BeNeLux & Southern Europe, Gemalto - a Thales Company

PREPARE FOR IMPACT – THE PREMIER PRIVILEGED ACCESS SECURITY EVENT

20+

Trainings & Hands-on Labs

Gain the hands-on experience to up your security game and build valued competencies – while helping your organization maximize its CyberArk investment.

FREE

CyberArk Certification

Twice as many training sessions mean more opportunities to hone your skills – and earn up to 16 CPE credits – to satisfy your CISSP requirements for one year.

PARTNER

Exclusive

Dedicated partner certification sessions, special track session for partners only, and a partner awards ceremony.

20+

Breakouts

Accelerate your career and improve your business with content designed to inform and inspire, as well as targeted tracks that ensure you walk away with actionable next steps.

100+

Technical Experts

Gain access to the subject matter experts transforming the security industry, learn about CyberArk’s technology roadmap, and gain real-world insights to optimize your CyberArk deployments.

MORE

Peer Networking

Connect with PAS professionals, partners, and the CyberArk community to share industry best practices, case studies, trends, strategies and solutions.

20+

Trainings & Hands-on Labs

With double the number of training sessions and labs, you’ll have more opportunities than ever to learn about CyberArk’s latest PAS solutions. You will have the flexibility to take more sessions, while experimenting with innovative CyberArk technologies and solutions.

FREE

CyberArk Certification

Twice as many training sessions means twice as many opportunities to hone your skills and earn 16+ continuing professional education (CPE) credits – and satisfy your CISSP requirements for one year. And, because fees are waived for CyberArk Defender and Sentry certifications, you’ll leave with the added credibility and increased value that comes from achieving the industry’s most sought-after credentials.

PARTNER

Exclusive

Engage in dedicated partner certification sessions for sales and pre-sales professionals, combined with special partner business sessions and an awards ceremony to honor our over achieving partners.

20+

Breakouts

Take home the practical knowledge to accelerate your career and improve your business by diving into the newest PAS technologies and trends with subject matter experts. Targeted content ensures you walk away with actionable steps to make an impact on your organization, and your career.

100+

Technical Experts

More than 100 technical experts will be on hand to provide knowledge and discuss the transformations taking place in the security industry. They’ll share CyberArk’s technology roadmap and real-world insights from experience designing and deploying CyberArk solutions.

MORE

Peer Networking

Connect with the CyberArk community and learn first-hand how our customers, partners and ecosystem are working together to solve today’s most pressing security challenges. Every day is a new opportunity to share industry best practices, case studies, strategies and solutions.

AGENDA

7:00

BREAKFAST AT THE HOTEL FOR HOTEL GUESTS

9:00

REGISTRATION OPEN

9:30 – 19:15

PEARSON CERTIFICATION EXAMS

Certifications
CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED!
Click here to learn more about what is available and to book your slot.

9:30 - 10:30

CERTIFIED PRE-SALES ENGINEER (CPE) BOOTCAMP

Do you want to learn how to think like us, talk like us, and demo like us?
Welcome to CyberArk’s Certified Presale Engineer (CPE) Certification where you will gain the tricks of the trade to secure the heart of the enterprise.

Learn why CyberArk is the undisputed leader in Privileged Access Security and how to adopt a “think like an attacker” mindset to secure your customer’s most critical resources.
By the end of this bootcamp, you will walk away with the knowledge, tools and resources needed to be successful and earn the title of CyberArk CPE!

Exam:
A live, online multiple-choice exam will be administered upon course completion. Please bring your laptop with you.

9:30 - 10:30

CERTIFIED SALES PROFESSIONAL (CSP) BOOTCAMP

This session is suitable for sales engineers who want to gain proficiency and broaden the depth and breadth of their skill set to help customers maximize the value of their technology investments and transform their businesses. The session will include positioning, licensing, competitive landscape and CyberArk differentiators.

Exam:
A live, online multiple-choice exam will be administered upon the completion of the Certified Sales Professional (CSP) course. Please bring your laptop with you.

9:30 - 10:30

WHAT'S NEW

Audience:
Customers contemplating upgrading to the latest version of CyberArk

Description:
A review of new features added over the past several release of CyberArk and their importance to your Privileged Account Security Program
Topics: v10 Aggregated Release Notes”

9:30 - 10:30

ACCOUNTS DISCOVERY LAB

Level:
Beginners

Audience:
Vault Administrators responsible for onboarding privileged accounts

Description:
In this lab, attendees will configure continuous discovery processes, and automatic onboarding rules to reduce unmanaged privileged accounts and access.

Topics:
– Accounts Discovery Scan
– Pending Accounts
– Automatic Onboarding Rules”

10:30 - 11:00

COFFEE BREAK

11:00 - 12:00

CERTIFIED PRE-SALES ENGINEER (CPE) BOOTCAMP - CONTINUED

Do you want to learn how to think like us, talk like us, and demo like us?
Welcome to CyberArk’s Certified Presale Engineer (CPE) Certification where you will gain the tricks of the trade to secure the heart of the enterprise.

Learn why CyberArk is the undisputed leader in Privileged Access Security and how to adopt a “think like an attacker” mindset to secure your customer’s most critical resources.
By the end of this bootcamp, you will walk away with the knowledge, tools and resources needed to be successful and earn the title of CyberArk CPE!

Exam:
A live, online multiple-choice exam will be administered upon course completion. Please bring your laptop with you.

11:00 - 12:00

CERTIFIED SALES PROFESSIONAL (CSP) BOOTCAMP - CONTINUED

This session is suitable for sales engineers who want to gain proficiency and broaden the depth and breadth of their skill set to help customers maximize the value of their technology investments and transform their businesses. The session will include positioning, licensing, competitive landscape and CyberArk differentiators.

Exam:
A live, online multiple-choice exam will be administered upon the completion of the Certified Sales Professional (CSP) course. Please bring your laptop with you.

11:00 - 12:00

DEVELOPING A PRIVILEGED ACCESS SECURITY PROGRAM

Level:
Beginner

Audience:
Everyone

Description:
CyberArk Hygiene Program overview

11:00 - 12:00

EPM POLICIES LAB

Level:
Intermediate

Audience:
Endpoint Privilege Manager (EPM) Administrators looking to get started on creating policies.

Description:
Attendees will gain hands-on experience with key features of EPM including: policy creation, ransomware protection, advanced credential theft detection and blocking, integration with CyberArk’s Privileged Threat Analytics (PTA) for advanced defense and real-time response, and using advanced policies to restrict and block application resource access to the internet.

12:00 - 12:15

BREAK

12:15 - 13:15

CERTIFIED PRE-SALES ENGINEER (CPE) BOOTCAMP - CONTINUED

Do you want to learn how to think like us, talk like us, and demo like us?
Welcome to CyberArk’s Certified Presale Engineer (CPE) Certification where you will gain the tricks of the trade to secure the heart of the enterprise.

Learn why CyberArk is the undisputed leader in Privileged Access Security and how to adopt a “think like an attacker” mindset to secure your customer’s most critical resources.
By the end of this bootcamp, you will walk away with the knowledge, tools and resources needed to be successful and earn the title of CyberArk CPE!

Exam:
A live, online multiple-choice exam will be administered upon course completion. Please bring your laptop with you.

12:15 - 13:15

CERTIFIED SALES PROFESSIONAL (CSP) BOOTCAMP - CONTINUED

This session is suitable for sales engineers who want to gain proficiency and broaden the depth and breadth of their skill set to help customers maximize the value of their technology investments and transform their businesses. The session will include positioning, licensing, competitive landscape and CyberArk differentiators.

Exam:
A live, online multiple-choice exam will be administered upon the completion of the Certified Sales Professional (CSP) course. Please bring your laptop with you.

12:15 - 13:15

FINDING MORE WITH DNA

Level:
Beginner

Audience:
Vault Administrators

Description:
In this session, attendees will learn how to maximize what the CyberArk Discovery and Audit (DNA) tool is able to discover within their networks, and how to interpret the results and take action towards securing privileged access.

12:15 - 13:15

RestAPI LAB

Level:
Advanced

Audience:
Vault Administrators

Description:
In this lab, attendees will build a safe provisioning script using the CyberArk RestAPI.

13:15 - 14:15

LUNCH AT THE DISCOVERY CENTER

14:15 - 15:15

CERTIFIED PRE-SALES ENGINEER (CPE) BOOTCAMP - CONTINUED

Do you want to learn how to think like us, talk like us, and demo like us?
Welcome to CyberArk’s Certified Presale Engineer (CPE) Certification where you will gain the tricks of the trade to secure the heart of the enterprise.

Learn why CyberArk is the undisputed leader in Privileged Access Security and how to adopt a “think like an attacker” mindset to secure your customer’s most critical resources.
By the end of this bootcamp, you will walk away with the knowledge, tools and resources needed to be successful and earn the title of CyberArk CPE!

Exam:
A live, online multiple-choice exam will be administered upon course completion. Please bring your laptop with you.

14:15 -15:15

GETTING READY FOR YOUR EPM PROJECT

Level:
Beginner

Audience:
CyberArk Endpoint Privilege Manager (EPM) Administrators

Description:
In this session, attendees will learn about best practices while running an Endpoint Privilege Manager project, from project planning and change management to high level configuration and setup.

14:15 - 15:15

SECURING CLOUD ASSETS WITH CYBERARK

Level:
Intermediate

Audience:
CyberArk Vault Administrators

Description:
In this session, attendees will learn how to leverage the CyberArk Privileged Access Security Solution to protect their Cloud-based assets; covering AWS, Azure and Google Cloud Platform environments.

14:15 - 15:15

ACCOUNTS DISCOVERY LAB

Level:
Beginners

Audience:
Vault Administrators responsible for onboarding privileged accounts

Description:
In this lab, attendees will configure continuous discovery processes, and automatic onboarding rules to reduce unmanaged privileged accounts and access.

Topics:
– Accounts Discovery Scan
– Pending Accounts
– Automatic Onboarding Rules

15:15 - 15:30

BREAK

15:30 - 16:30

CERTIFIED PRE-SALES ENGINEER (CPE) BOOTCAMP - CONTINUED

Do you want to learn how to think like us, talk like us, and demo like us?
Welcome to CyberArk’s Certified Presale Engineer (CPE) Certification where you will gain the tricks of the trade to secure the heart of the enterprise.

Learn why CyberArk is the undisputed leader in Privileged Access Security and how to adopt a “think like an attacker” mindset to secure your customer’s most critical resources.
By the end of this bootcamp, you will walk away with the knowledge, tools and resources needed to be successful and earn the title of CyberArk CPE!

Exam:
A live, online multiple-choice exam will be administered upon course completion. Please bring your laptop with you.

15:30 - 16:30

INTRO TO PTA

Level:
Intermediate

Audience:
Anyone that is involved is a Privileged Access Security program

Description:
In this session, attendees that are interested in introducing additional controls to their Privileged Access Security programs, will gain a deeper technical understanding of the Privileged Threat Analytics (PTA). The session will cover use cases to detect, alert, and respond to attacks involving privileged access. The session will also include demos and examples of ways that PTA can protect against irreversible network take overs.

15:30 - 16:30

SECURING IN-HOUSE APPS WITH APPLICATION ACCESS MANAGER (AAM)

Level:
Advanced

Audience:
For Advanced Administrators of Privileged Access Security who need to lead Application Access Manager (AAM) integration projects

Description:
In this session, attendees will learn about the Application Access Manager (AAM) Credential Provider, Central Credential Provider, and Application Security Credential Provider’s capabilities to secure credentials used by third-party applications. Attendees will discover several AAM use cases that they can implement to improve their organization’s security posture.

Topics:
Credential Provider, SDK, CCP, ASCP, Push Method

15:30 - 16:30

EPM POLICIES LAB

Level:
Intermediate

Audience:
Endpoint Privilege Manager (EPM) Administrators looking to get started on creating policies.

Description:
Attendees will gain hands-on experience with key features of EPM including: policy creation, ransomware protection, advanced credential theft detection and blocking, integration with CyberArk’s Privileged Threat Analytics (PTA) for advanced defense and real-time response, and using advanced policies to restrict and block application resource access to the internet.

16:30 - 17:00

COFFEE BREAK AT THE DISCOVERY CENTER

17:00 - 18:00

CERTIFIED PRE-SALES ENGINEER (CPE) BOOTCAMP EXAM

Join this live, online, multiple-choice exam to become certified as a CyberArk Presale Engineer.

Please bring your laptop with you.

17:00 - 18:00

INTRO TO PSM SUITE

Level:
Beginner

Audience:
Vault Administrators

Description:
In this session, attendees looking to add Privileged Session Manager (PSM) to their CyberArk deployments will learn about the three flavors of PSM, their security benefits, and their affects on user workflows.

Topics:
PSM for Windows, PSM for SSH, PSM for cloud

17:00 - 18:00

PREVENTING RANSOMWARE AND CREDENTIAL THEFT WITH EPM

Level:
Intermediate

Audience:
CyberArk Endpoint Privilege Manager (EPM) Administrators.

Description:
In this session, attendees will learn how to use Endpoint Privilege Manager (EPM) to protect against credential theft, ransomware and additional advanced protections like restricting application access. The session will cover, among other things, how EPM can be leveraged to prevent file-less malware attacks that use PowerShell to access the internet.

17:00 - 18:00

APPLICATION ACCESS MANAGER (AAM) FOR DEVOPS LAB

Level:
Intermediate

Target Audience:
Privileged Access Security leaders and team members that will lead implementation projects to secure secrets used within DevOps pipelines and cloud native applications

Description:
In this lab, attendees will gain hands-on experience installing and implementing Conjur to support high-availability and fault tolerance. Additionally, attendees will learn basic administration functions to add and retrieve secrets, as well as how to integrate Conjur with the Enterprise Password Vault.

18:00 - 20:00

WELCOME RECEPTION AT THE PASSENGER TERMINAL AMSTERDAM CONVENTION CENTER (PTA) WITH CYBERARK DISCOVERY CENTER

7:30

REGISTRATION OPEN

8:00 - 9:00

EARLY COFFEE AT THE DISCOVERY CENTER (BREAKFAST AVAILABLE AT THE HOTEL FOR HOTEL GUESTS)

8:00 - 9:00

WOMEN IN SECURITY BREAKFAST AT THE ijBOX

09:00-09:15

WELCOME!

Rich Turner, Senior Vice President, CyberArk

09:15-09:45

EXPANDING OUR REACH, SECURING THE WORLD'S DIGITAL BUSINESS

Udi Mokady, CyberArk Founder, Chairman &CEO

09:45-10:45

CYBERARK PRODUCT AND SOLUTIONS UPDATE

Karen Eldor, Vice President Product Management, CyberArk
Yair Sade, Vice President Product Management, CyberArk

10:45-11:00

CUSTOMER STORY

11:00 - 11:15

COFFEE BREAK

11:15 - 18:15

PEARSON CERTIFICATION EXAMS

CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED!
Click here to learn more about what is available and to book your slot.

PAS Essentials
In the PAS Essentials break out session track we focus on the foundational requirements for your privileged access security project and deployment. These sessions will provide you with practical knowledge designed to accelerate and improve your business by diving into the newest technologies and trends within the privileged access security space. Learn from CyberArk security practitioners and technical experts to understand best practices for the Core PAS Solution, discover proven automation techniques and methodologies to better operationalize your solutions, and learn how you can take a risk-based approach to privileged access security.

PAS Advanced
In the PAS Advanced break out session track we take it one step further by extending privileged access security to the application layer, to the endpoint, to the cloud and beyond. These sessions “double click” into the CyberArk technology stack and will provide detailed insights and best practices directly from both CyberArk experts and customers from the Fortune 500. We will dive deep on CyberArk’s emerging technologies and solutions, provide advanced recommendations and best practices, understand real world use cases and learn how CyberArk is helping mitigate risk from advanced attacks from our customers. Elevate your privileged access security strategy from a small silo’d project to a full-fledged enterprise-wide initiative.

The CISO Perspective
Cyber defence is a team game, and playing in a team game requires planning, communication and great execution.
If you and your team manage complex business environments that need strategic business security solutions, developed and integrated by the minds of many, then The CISO Perspective Track will be perfect for you.
Sessions in this track will be delivered by industry-leading minds and industry-leading partnerships. Together, they will demonstrate how cyber security is one team game that is worth investing time and effort into.

11:15-11:35

CYBERARK IS A TEAM GAME

Matthew Daubney, NIS Cyber Security Engineer, PwC

Maximising the value of CyberArk for a Firm requires careful positioning, smooth implementation and seamless support. This isn’t a job for the lone wolf, you need the right people in the right places at the right times, you need a team. This session will introduce you to the non technical side of a CyberArk implementation, who your key Team Members should be and how to use them effectively to make a success of your implementation.

11:35 - 11:40

BREAK

11:15 - 12:00

ENTERPRISE PASSWORD VAULT BEST PRACTICES

Description:
During this session on Enterprise Password Vault , learn how to automatically discover, onboard and secure privileged accounts and credentials with the Enterprise Password Vault based on best practices from CyberArk experts. This session will cover how to set up continuous discovery and set policies to ensure proper access and management of privileged accounts.

11:15 - 12:00

CREDENTIALS SECURED - NOW LOCK DOWN ADMIN RIGHTS

Description:
CyberArk Core PAS provides foundational security for Windows through privileged credential management, session isolation and control, and monitoring abnormal behaviour. At this stage, the permissions of these accounts are derived exclusively by Active Directory and the Windows operating system. In this session we look at the next stage of securing privilege access: locking down user permissions, so only specific actions can be performed based on role to mitigate risk of credential-based attacks.

11:15 - 12:15

CPM CUSTOMIZATION FOR SSH LAB

Level:
Advanced

Audience:
Vault Administrators

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

Topics:
PGU

11:40 - 12:00

SECURING THE KEY TO THE IT KINGDOM – A BANKING CASE STUDY

Ari Hakala, Senior Director of Business Development, Gemalto – a Thales Company

Find out how CyberArk and Gemalto, a Thales company, partnered to help a retail bank in the region drive forward its “Cloud First” strategy, seamlessly and securely, with CyberArk Privileged Access Security Solution and SafeNet Data Protection On Demand (DPoD), a cloud-based HSM solution. The HSM on Demand for CyberArk service within DPoD secures the master key for CyberArk Privileged Access Security Solution. Join us to learn how you can mitigate the risk of the master key being compromised and ensure confidentiality, integrity and availability of privileged credentials and meet data protection and compliance requirements.

12:00 - 12:15

BREAK

12:00 - 12:15

BREAK

12:00 - 12:15

BREAK

12:15 - 13:00

PRIVILEGED SESSION MANAGER BEST PRACTICES

Description:
During this session on Privilege Session Manager, learn best practices for isolating, recording, and monitoring privileged sessions from CyberArk experts. Enable your security teams to track user activity and detect suspicious events in real-time, and meet regulatory compliance requirements that mandate the proactive monitoring and recording of privileged sessions.

12:15 - 13:00

BEST PRACTICES FOR PROTECTING YOUR APPLICATIONS WITH APPLICATION ACCESS MANAGER

Description:
In this session, you will learn best practices for leveraging Application Access Manager to secure all types of application credentials from IT management and security software to applications driving digital transformation intiatives such as Robotics Process Automation, DevOps, and automation tools.

12:15 - 12:35

CYBERARK AND SAILPOINT: MAXIMIZE YOUR INVESTMENTS IN IDENTITY GOVERNANCE AND PRIVILEGED ACCESS SECURITY

Kev James, Distinguished Sales Engineer, SailPoint

All too often however, Privileged Access Security is implemented as an independent deployment from an identity governance solution which can create siloes and cause a number of challenges including lack of centralized visibility and loss of productivity. Attend this session as we show you the best of both worlds by uniting CyberArk Privileged Access Security with SailPoint Identity Governance providing a unified view with centralized policy-based identity management for all identities, including privileged accounts (individuals and applications) and access entitlements to ensure policy and regulatory compliance.
In this session you will learn how together CyberArk and SailPoint can:

  • Enable centralized visibility to govern and secure all of your user access – including privileged accounts
  • Improve productivity and operational efficiency by streamlining delivery of privileged access
  • Consolidate certifications for privileged and non-privileged accounts
  • We will also provide a real time integration demonstration

12:35 - 12:40

BREAK

12:15 - 12:30

BREAK

12:30 - 13:30

CPM/PSM CUSTOMIZATION FOR WEBAPPS LAB

Level:
Advanced

Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

Topics:
WebApp framework , PGU

12:40 - 13:00

DYNAMICALLY REDUCE RISK WHILE ALLOWING INNOVATION

Sanjit Shar, Sr. Director of Strategic Alliances, Forescout

How can you balance the need to secure your organization while allowing rapid innovations that include new levels of device and user connectivity?
Join us to learn how the Forescout – CyberArk integration can help your security team reduce risk by combining continuous visibility of devices and privileged accounts with automated policy-enforcement and threat response.
Let the new innovative connections commence while you reduce risk.

  • Continuously assess all devices as they connect and enforce compliance
  • Streamline compliance remediation such as discovering and sending rogue privileged credentials to CyberArk and detecting IoT devices with default passwords being used
  • Automatically respond to CyberArk detected threats with policy-driven Forescout network or host actions to isolate and help remediate
  • Keep credentials locked down by CyberArk, including those used by Forescout

13:00 - 14:00

LUNCH AT THE DISCOVERY CENTER

13:00 - 14:00

LUNCH AT THE DISCOVERY CENTER

13:00 - 14:00

LUNCH AT THE DISCOVERY CENTER

13:30 - 14:15

LUNCH AT THE DISCOVERY CENTER

14:00-14:20

How to Build Identity and Access Management Into Your Cloud First Strategy

Kristian Alsing, Managing Director, Accenture Security

The presentation will focus on the role of identity and access management in cloud migrations and cloud first strategies, reviewing changes to the threat landscape and challenges that new cloud architectures present. Of particular significant importance and difficulty to organizations is how to secure the cloud with identity and build capabilities to secure ever more dynamic workloads and platforms. Lastly there will be a focus on how to develop an identity strategy that will support the business transformation organizations strive for in their digital strategy.

14:20 - 14:25

BREAK

14:25-14:45

COMING SOON!

14:00 - 14:45

AUTOMATING CorePAS: BEST PRACTICES FOR MANAGING THE CorePAS PLATFORM, USING THE REST API AND INTEGRATIONS

Description:
It’s important that the CyberArk service be easily consummable by the business, and therefore automating as many of the operational aspects is key. In this session the CyberArk services team will run through best practices and examples of how administrator and management of the solution can be automated. Discussion points will include:
1. Recommended approaches to building automated credential onboarding and lifecycle management through the use of orchestration tools, request systems and scripts, and integration with CMDBs
2. How to drive automation around user management and safe management to enable businesses to meet tight SLAs around infrastructure availability demands
3. Resources available to you to begin your automation journey

14:00 - 14:45

INSIGHTS & BEST PRACTICES FOR SECURING CLOUD BASED APPLICATIONS AND INFRASTRUCTURE

Description:
In this session, you will have the unique opportunity to learn from real-world scenarios related to privileged access security in cloud environments. Our CyberArk experts will provide insights from lessons learned securing commercial SaaS applications, cloud infrastructure, and internal apps deployed in the cloud.

14:15 - 15:45

PSM CUSTOMIZATION FOR WINDOWS APPS LAB (90 MIN' SESSION)

Level:
Intermediate

Audience:
Vault Administrators looking to extend the capabilities of Privileged Session Manager (PSM).

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

Topics:
CLI, BYOC / Universal Connector

14:45 - 15:00

BREAK

14:45 - 15:00

BREAK

15:00 - 15:45

PRIVILEGED ACCOUNT MODEL...TO SHARE OR NOT TO SHARE? THAT IS THE QUESTION!

Description:
There are many ways to structure privileged accounts: from shared to named to hybrid. Consider how access should be granted: standing access vs. just in time access. Accounts and access are not all created equal and the use cases are wide ranging. This session will cover the benefits, challenges and adoption strategies for providing and controlling privileged access, based on CyberArk best practices and experience in customer engagements. Additionally, you’ll leave this session with insight into roadmap plans involving privileged access workflows.

15:00 - 15:45

GENERATING SECURE PRIVILEGED ACCESS TO A WIDE RANGE OF APPLICATIONS USING PRIVILEGED SESSION MANAGER FOR CLOUD

Description:
Have you been waiting patiently to experience a simplified, automated way to create a native and secured login process for managed accounts to a wide range of applications? Well wait no longer! In this session you will learn how CyberArk Solutions Engineering and Security Services can assist you in extending privileged access security to cloud, SaaS, on-premises custom web applications, and more. The Privileged Session Manager for Cloud Connector is a simple, easy-to-use plug-in technology that integrates with your systems to onboard the applications that require secure storage of privileged account credentials, session isolation and audit of the basic user operations; while also carefully balancing operational and end-user requirements.

15:45 - 16:00

COFFEE BREAK

16:00 - 16:30

PRIVILEGED ACCESS MANAGEMENT – THE PATH FORWARD. SPEAKER: FELIX GAEHTGEN, VP ANALYST GARTNER

16:30-17:15

THE CUSTOMER PERSPECTIVE: A YEAR IN REVIEW. CUSTOMER PANEL DISCUSSION.

Moderator: David Higgins, Technical Director, CyberArk

Panelists:

  1. Mr. Allyn Lindsay, Senior Security Technical Specialist, SKY, UK
  2. Mr. Andreas Waas, IT Cyber Security Center Siemens Healthineers, Germany
  3. Mr. Cristiano Ramponi, IT Architecture and Security Manager, Unipol Gruppo Finanziari, Italy
  4. Mr. Frank van der Spek, Manager Security Office, Robeco, Netherland

This panel discussion will feature a number of CyberArk customers who will share their stories on their privileged access security journey so far. Get the unique perspective of our EMEA-based customers as they provide insights into their challenges, successes, different strategies and approaches, and their organization’s outlook on the state of privileged access security for the present and future.

17:15 - 18:00

TIME TO GET READY FOR DINNER! (FOR NON-PARTNER ATTENDEES)

17:15 - 18:00

PARTNER AWARDS AT THE CONVENTION CENTER

18:00 - 23:00

CYBERARK EVENING EVENT AT STRANDZUID (BOATS DEPART AT 18:00 FROM THE PTA)

8:00 - 9:00

EARLY COFFEE AT THE DISCOVERY CENTER (BREAKFAST AVAILABLE AT THE HOTEL FOR HOTEL GUESTS

8:00 - 9:00

CHAMPIONS BREAKFAST AT THE ijBOX

09:00-09:05

WELCOME! IMPACT 2ND DAY

Rich Turner, Senior Vice President, CyberArk

09:05-09:35

IT WASN'T ME - IT WAS BENNETT ARRON

Bennett Arron, Award-Winning Writer & Stand-Up Comedian

Bennett Arron is an Award-Winning Writer, Stand-Up Comedian and BAFTA Shortlisted Director, but he is also one of the first major victims of Identity Theft in the UK.
Bennett turned his experience into an acclaimed comedy show & several documentaries, and he is coming to CyberArk Impact 2019 to tell you all about it!

09:35-10:15

SECURITY IS A TEAM GAME

Moderator: Mr. David Higgins, Technical Director, CyberArk

Panelists:

  1. Mr. Mads Nørgaard Madsen, EMEA PwC PAM lead and Cyber Security lead Denmark, PwC
  2. Mr. Ed Barry, VP of Business Development, Sailpoint
  3. Mr. Dirk Geeraerts, Regional Sales Director BeNeLux & Southern Europe, Gemalto – a Thales Company

Join Mr. David Higgins, Technical Director, CyberArk for a discussion with SailPoint, PWC, and Gemalto about the value of approaching security as a team game to proactively defend against evolving, increasingly damaging attacks.

10:15 - 10:45

COFFEE BREAK

10:45 - 15:15

PEARSON CERTIFICATION EXAMS

Certifications
CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED!
Click here to learn more about what is available and to book your slot.

PAS Essentials
In the PAS Essentials break out session track we focus on the foundational requirements for your privileged access security project and deployment. These sessions will provide you with practical knowledge designed to accelerate and improve your business by diving into the newest technologies and trends within the privileged access security space. Learn from CyberArk security practitioners and technical experts to understand best practices for the Core PAS Solution, discover proven automation techniques and methodologies to better operationalize your solutions, and learn how you can take a risk-based approach to privileged access security.

PAS Advanced
In the PAS Advanced break out session track we take it one step further by extending privileged access security to the application layer, to the endpoint, to the cloud and beyond. These sessions “double click” into the CyberArk technology stack and will provide detailed insights and best practices directly from both CyberArk experts and customers from the Fortune 500. We will dive deep on CyberArk’s emerging technologies and solutions, provide advanced recommendations and best practices, understand real world use cases and learn how CyberArk is helping mitigate risk from advanced attacks from our customers. Elevate your privileged access security strategy from a small silo’d project to a full-fledged enterprise-wide initiative.

Partner Advantage
The dedicated CyberArk Partner track highlights a variety of topics to assist partners in identifying strategic business opportunities; detailing the CyberArk Hygiene Program, a tried and tested methodology that promotes best practices and is relevant to existing and prospective clients. We delve into our approach to managed service delivery and unveil our MSP partner program to address client consumption models. In addition, we offer insights and approaches to migrate existing customers to our Core PAS offering, while also showcasing our C3 Alliance partners and the value these vendor relationships can bring in building wider solutions and easier integrations.

10:45 - 11:30

WHAT MAKES (OR BREAKS) A CREDENTIAL STEALER

Description:
In this talk from CyberArk Labs, you will learn what it takes for a malware to become a credential stealer.
We’ll take a look at the inner workings of some of the most popular credential stealers of the last year or two and see what makes each special. Moreover, we’ll illustrate what attackers are doing with those stolen credentials after the attack and try to understand attackers incentives in writing such malware.

10:45 : 11:30

RED TEAM TALE FROM THE TRENCHES

Description:
In this session, the CyberArk Red Team will share insights and lessons learned from recent Red Team engagements, as well as discussing how to get started with your own Red Team program at your organization. This session will arm you with the necessary content that can be customized for your end user security education and awareness efforts related to privileged access.

10:45 - 13:30

UPGRADING TO CORE PAS

Description:
In this session we will articulate the client value in migrating to CyberArk Core PAS solution, functionality and feature enhancements, upgrade methodology, pricing calculation with examples together with sales and services related opportunities.

10:45 -12:15

PAS TROUBLESHOOTING LAB (90 MIN' SESSION)

Level:
Beginner

Audience:
Vault Administrators

Description:
In this lab, attendees will be given a simple task to perform in a prepared lab environment. However, several configuration issues will occur, and attendees will be challenged to use their troubleshooting skills, as well as their CyberArk support resources to find and resolve all issues and complete the task

Topics:
Privileged Access Security Troubleshooting

11:30 - 11:45

BREAK

11:30 - 11:45

BREAK

11:30 - 11:45

BREAK

11:45 - 12:30

PRIVILEGED THREAT ANALYTICS BEST PRACTICES

Description:
Join this best practices session to learn how you can leverage Privileged Threat Analytics to simplify day to day management of your PAS program and prevent attacks involving privleged access.

11:45 - 12:30

CAN YOU ESCAPE THIS?

Description:
In this session, the CyberArk Labs team will mimic some of the escapes performed by the Great Houdini, an American magician noted for his sensational escape acts but this time, from a live (privileged) container. We will explain why containers are more susceptible to escapes compared to virtual machines, and detail the different paths escapes may be performed from privileged containers to the host machine.

11:45 - 12:30

7 STEPS FOR RAPID RISK REDUCTION

Description:
When looking at the majority of significant breaches, leveraging privileged credentials is a key part of the attacker’s toolset. This allows them to gain an initial foothold, move laterally and exfiltrate sensitive data. The CyberArk Privileged Access Security Hygiene program is designed to help organisations quickly improve their security posture by taking control of mission critical assets and privileged credentials in a systematic, risk based approach to break the attack cycle. The 7 steps of the Hygiene program highlights where securing privilege is essential and how this can be achieved in the shortest amount of time with limited internal resources.

12:15 - 13:30

LUNCH AT THE DISCOVERY CENTER

12:30 - 13:30

LUNCH AT THE DISCOVERY CENTER

12:30 - 13:30

LUNCH AT THE DISCOVERY CENTER

12:30 - 13:30

LUNCH AT THE DISCOVERY CENTER

13:30 - 14:15

CHANGE IS HARD - BEST PRACTICES FOR DRIVING ADOPTION OF A COMPREHENSIVE PAS PROGRAM

Description:
Why do some security programs move forward with ease, while others remain stagnant? Attend this session to hear directly from CyberArk customers and experts on how to break through barriers and accelerate the adoption of a PAS program in your organization. You’ll leave this session knowing how to best implement end user security education and awareness efforts related to privileged access security.

13:30 - 14:15

SECURING THE BEACHHEAD - PROTECT THE INITIAL INTRUSION POINT TO BLOCK LATERAL MOVEMENT INSIDE THE ORGANIZATION

Description:
Protecting the heart of the enterprise starts exactly there, locking down the systems that are most critical to the organisation. However, the endpoint continues to remain the initial point of intrusion whereby attackers can compromise these devices and establish a beachhead with relative ease. In this session we detail how to remove local admin rights and prevent credential theft from developer and IT admin workstations, which are a common target for attackers.

13:30 - 14:15

CYBERARK MANAGED SERVICES PARTNER PROGRAM: SECURING AND MANAGING THE DIGITAL BUSINESS

Audience:
CyberArk Partners, Managed Services Providers, Managed Security Service Providers, Cloud Service Providers, Resellers, Delivery Partners, Customers interested leveraging Managed PAS or PASaaS

Description:
In this session we will introduce the CyberArk Managed Services and Privileged Cloud Program for Partners, providing an insight into the Privileged Access Security options, partner program and building blocks for a comprehensive Managed Services and Privileged Cloud offering.

13:30 - 15:00

PAS TROUBLESHOOTING LAB (90 MIN' SESSION)

Level:
Beginner

Audience:
Vault Administrators

Description:
In this lab, attendees will be given a simple task to perform in a prepared lab environment. However, several configuration issues will occur, and attendees will be challenged to use their troubleshooting skills, as well as their CyberArk support resources to find and resolve all issues and complete the task

Topics:
Privileged Access Security Troubleshooting

14:15 - 14:30

BREAK

14:15 - 14:30

BREAK

14:15 - 14:30

BREAK

14:30 - 15:15

DEVOPS DEEP DIVE FOR SECURITY PROFESSIONALS

Description:
You’ve seen the presentations, but you really want to experience the code, and maybe even try it yourself. Security professionals will get to the next level in this demo laden session, from launching a secrets management platform to securing a Jenkins environment. You’ll leave better prepared to help developers secure their code.

14:30 - 15:15

CAPTURE THE FLAG - ARKCON SOLUTION REVEAL

Description:
This fun interactive session from the CyberArk Lab’s team will reveal the solutions made available throughout the event at the Arkcon Challenge. Winners will be announced during the closing main stage presentation immediately following this session.

14:30 - 15:15

C3 ALLIANCE- PARTNERING TO WIN

Description:
CyberArk has over One hundred C3 Alliance Partners, who together provide numerous out-of-the-box value added solutions for partners to implement.
Join this session to learn more about CyberArk C3 Alliance and how it can differentiate you from the rest of the market, increase your pipeline and win rates.

15:00 - 15:30

BREAK

15:15 - 15:30

BREAK

15:15 - 15:30

BREAK

15:15 - 15:30

BREAK

15:30

IMPACT 2019 CLOSING REMARKS

Rich Turner, Senior Vice President, CyberArk

16:00

COFFEE & GOODBYES!

VENUE

CyberArk Impact 2019 will be held at the Passenger Terminal Amsterdam (PTA) Convention Center, Netherlands.
CyberArk has secured hotel rooms nearby that can be booked during the registration process.
Be sure to make your reservations early to ensure availability and get the special CyberArk group rate!

Passenger Terminal Amsterdam (PTA)

Piet Heinkade 27, 1019 BR, Amsterdam, Netherlands
T +31 20 509 10 00

HOTELS

The Mövenpick Hotel Amsterdam City Centre

Piet Heinkade 11, 1019 BR Amsterdam, Netherlands
Tel: +31 20 509 12 00

CyberArk has negotiated a special discounted nightly rate at
The Mövenpick Hotel Amsterdam City Centre.
All room reservations must be made through the CyberArk event registration system to guarantee the CyberArk negotiated rates.
CyberArk Group Rate: €249+ Per Night

CONVINCE YOUR BOSS

Ready to attend but need help justifying your trip?
We've done the work for you with a ready-made justification letter for CyberArk Impact 2019 that will help you make your case.

OUR ESTEEMED SPONSORS

FAQ

CyberArk Impact 2019 will be held at The Passenger Terminal Amsterdam (PTA) Convention Center, May 21st – 23rd.
The PTA is located at Piet Heinkade 27, 1019 BR, Amsterdam, Netherlands.

Depending on route, Amsterdam Schiphol Airport is about 21 km from The Passenger Terminal Amsterdam (PTA) Convention Center (appx. 30 minutes’ drive).

Taxi:
The authorized taxi ranks at Schiphol Airport can be found right outside the departure and arrival halls. You can choose a regular taxi, a luxury Schiphol Business Taxi or a Schiphol Travel Taxi minibus. Expect authorized taxi fare from Schiphol to the PTA to cost
€50 or more. Uber service is also available.

Train:
Amsterdam Central Station is within a walking distance from The PTA Convention Center.
For guests staying at the Mövenpick Hotel, the hotel offers a complimentary shuttle bus from Central Station. Please book your seats in advance with the hotel concierge service: +31 (0)20 519 1213.

Schiphol Train Station is located just below the airport. It takes a couple of minutes to walk from Arrivals to Schiphol Plaza, where you can take the stairs, escalator or lift down to the platforms.
Direct trains from Schiphol airport to the PTA are available, travel time is approximately 15 minutes, depending on time and route, and train fares is €4.5. Use this link to plan your journey: https://www.ns.nl/en

For more information on transport from Schiphol go to: https://www.schiphol.nl/en/page/transportation-from-schiphol/

Customers:
The conference is free for all CyberArk customers. Government attendees are required to pay €485 due to CyberArk compliance policies. All attendees are responsible for covering the cost of their hotel accommodations, air travel, transportation between hotel and airport, as well as any other incidental expenses.

Partners:
CyberArk partners can take advantage of full three days of Impact sessions and events by purchasing a pass for €199.
All partner attendees are responsible for covering the cost of their hotel accommodations, air travel, transportation between hotel and airport, as well as any other incidental expenses.

CyberArk has secured hotel rooms nearby the event venue with special discounted nightly rate, those rooms can be booked during the registration process.
Be sure to make your reservations early to ensure availability and enjoy the special CyberArk group rate!

The Mövenpick Hotel Amsterdam City Centre Cancellation Policy
You may cancel without penalty up until 12 noon (hotel local time) 14 days before your arrival.
If you cancel or shorten your stay with less than 14 days notice the hotel will charge you for the whole stay (100% of the total accommodation cost).
To secure the reservation, you must provide a valid credit card at the time of booking. This guarantees your booking. Payment will be processed at check in or if a penalty is applied.
Please ensure you read the cancellation policy.

Yes. To book additional nights outside of the event dates, please do so during the registration process. While the event rate is available 3 nights pre and post, it is based on hotel occupancy and is not guaranteed, so we recommend that you book early.

Register online by clicking here and follow the on-screen instructions to complete the process.  You will receive a confirmation email once you complete the registration.

No – you must register before arriving on-site. Registration will close on Monday, May 13th.

Unlike previous years, there is no limit to the number of attendees from your organization! And CyberArk Impact has a great mix of sessions for a variety of attendees – from business sessions to technical labs, and opportunities for executive alignment to networking time for CyberArk admins.

Unfortunately not, Impact is a business event for Privileged Access Security (PAS) experts, and is not designed for external guests.

Yes, please forward your colleague the registration email and code you have received from CyberArk.

The dress code for the conference is business casual. The dress code for evening events is casual.

Yes – you can earn up to 16 credits depending on how many days / sessions you attend. Attendees are responsible for submitting their credits directly to ISC2 (or relevant organization).

Yes – more than ever!

CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level that best aligns with your responsibilities and career ambitions. CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED! Click here to learn more about what is available and to book your slot.

REGISTER NOW

As the organizer, we will manage this event in good faith and in conformance with industry standards. CyberArk makes no other representations or warranties regarding the event. We reserve the right to change the agenda without prior notice, and will not be liable for any claims, damages, losses, expenses, costs or liabilities whatsoever arising out of or in connection with the cancelation or rescheduling of the event for any reason. These terms and conditions and any action arising out of or in connection with them are governed by the laws of England & Wales. Both you and CyberArk agree to the exclusive jurisdiction of the courts of England & Wales. Under no circumstances will CyberArk or anyone acting on its behalf be liable in any way for any claims, damages, losses, expenses, costs or liabilities whatsoever arising from any case of force majeure. In no event will CyberArk or anyone acting on its behalf be liable for any indirect, special, incidental, consequential or punitive damages however caused, whether in contract, tort or under any other theory of liability, and whether or not any such person or entity has been advised of the possibility of such damages. In no event will CyberArk’s, or anyone acting on its behalf, liability arising out of or related to this event exceed $1,000. To the extent that you use any websites, facilities or services of third party vendors CyberArk may utilize in relation to this event or any related offer(s), you agree to comply with the terms and conditions required by those third parties. Furthermore, please note that the privacy policies governing such third party websites are in no way under the control of or otherwise associated with CyberArk and should be thoroughly reviewed by you.