AGENDA

7:00 AM - 8:00 AM

Breakfast

8:00 AM - 6:00 PM

Certification

CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/.

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED! Click here to learn more about what is available and to book your slot.

8:00 AM - 9:00 AM

Certified Sales Professional (CSP) Refresh

A review of Certified Sales Professional proficiencies, including positioning, licensing, competitive landscape and CyberArk differentiators. This training is suitable for Certified Sales Professionals who want a primer before moving on to the Certified Pre-Sales Engineer (CPE) session.

8:00 AM - 9:30 AM

CPM/PSM Customization for WebApps Lab (001)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

8:00 AM - 9:30 AM

CPM Customization for SSH Lab (001)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

8:00 AM - 9:30 AM

Accounts Discovery Lab (001)

Level:
Beginner

Target Audience:
Vault Administrators responsible for onboarding privileged accounts

Description:
In this lab, attendees will configure continuous discovery processes, and automatic onboarding rules to reduce unmanaged privileged accounts and access.

8:00 AM - 9:30 AM

RestAPI Lab (001)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees will build a safe provisioning script using the CyberArk RestAPI.

8:00 AM - 9:30 AM

Training: Defender Exam Prep (001)

Level:
Advanced

Target Audience:
Vault Administrators who are preparing to complete the Defender Certification. It is recommended that you have either recently completed the PAS Administration course, or have two years of experience as a Vault Admin.

Description:
In this session, attendees will practice for the CyberArk Defender Certification exam by participating in a fun game.

8:00 AM - 9:30 AM

Training: Intro to PAS (001)

Level:
Beginner

Target Audience:
Anyone

Description:
In this session, attendees will learn the business cases for implementing a privileged access security program, and complete their CyberArk Trustee Certification.

8:00 AM - 9:30 AM

Training: Intro to PAS (002)

Level:
Beginner

Target Audience:
Anyone

Description:
In this session, attendees will learn the business cases for implementing a privileged access security program, and complete their CyberArk Trustee Certification.

8:00 AM - 9:30 AM

Training: PAS Troubleshooting (001)

Level:
Advanced

Target Audience:
CyberArk Vault Administrators who are looking to become more self-sufficient when dealing with break/fix scenarios with CyberArk

Description:
In this session, attendees will learn about some of the advanced troubleshooting techniques used by CyberArk Support. Attendees will become more self-sufficient when attempting to resolve problems, and will also be able to make better use of the CyberArk logs.

9:00 AM - 1:00 AM

Certified Pre-Sales Engineer (CPE) Bootcamp

CPEs demonstrate valuable knowledge around running a base use case demo of the CyberArk solution, running and analyzing a Discovery and Audit (DNA) scan, and conducting a Proof of Concept (POC).

Exam: A live, online multiple-choice exam will be administered upon course completion. Please bring your laptop.

Upon successful completion of the Certified Pre-Sales Engineer (CPE) exam you will receive your ticket to attend Thursday’s partner-exclusive TechJam.

9:00 AM - 5:00 PM

Certified Sales Professional (CSP) + Certified Pre-Sales Engineer (CPE) Bootcamp

A single session for professionals seeking both Certified Sales Professional (CSP) and Certified Pre-Sales Engineer (CPE) training.
Certified Sales Professional (CSP): Proficiencies include positioning, licensing, competitive landscape and CyberArk differentiators.

Certified Pre-Sales Engineer (CPE): CPEs demonstrate valuable knowledge around running a base use case demo of the CyberArk solution, running and analyzing a Discovery and Audit (DNA) scan, and conducting a Proof of Concept (POC)
This session is suitable for sales engineers who want to gain proficiency and broaden the depth and breadth of their skill set to help customers maximize the value of their technology investments and transform their businesses.
Exam: A live, online multiple-choice exam will be administered upon the completion of the Certified Sales Professional (CSP) course and Certified Pre-Sales Engineer (CPE) course. Please bring your laptop.

Upon successful completion of the Certified Pre-Sales Engineer (CPE) exam you will receive your ticket to attend Thursday’s partner-exclusive TechJam.

*Note: If you would just like to attend the CSP portion of the bootcamp and then transition into the Partner Business Session in the afternoon, please indicate this in your registration.

9:30 AM - 9:45 AM

Break

9:45 AM - 11:15 AM

CPM/PSM Customization for WebApps Lab (002)

Level:
Advanced

Target Audience:

Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

9:45 AM - 11:15 AM

PSM Customization for Windows Apps Lab (001)

Level:
Intermediate

Target Audience:
Vault Administrators looking to extend the capabilities of Privileged Session Manager (PSM).

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

9:45 AM - 11:15 AM

EPM Policies Lab (001)

Level:
Intermediate

Target Audience:
Endpoint Privilege Manager (EPM) Administrators looking to get started on creating policies.

Description:
Attendees will gain hands-on experience with key features of EPM including: policy creation, ransomware protection, advanced credential theft detection and blocking, integration with CyberArk’s Privileged Threat Analytics (PTA) for advanced defense and real-time response, and using advanced policies to restrict and block application resource access to the internet.

9:45 AM - 11:15 AM

Application Access Manager (AAM) for DevOps Lab (001)

Level:
Intermediate

Target Audience:
Privileged Access Security leaders and team members that will lead implementation projects to secure secrets used within DevOps pipelines and cloud native applications

Description:
In this lab, attendees will gain hands-on experience installing and implementing Conjur to support high-availability and fault tolerance. Additionally, attendees will learn basic administration functions to add and retrieve secrets, as well as how to integrate Conjur with the Enterprise Password Vault.

9:45 AM - 11:15 AM

Training: Sentry Exam Prep (001)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this session, attendees will practice for the CyberArk Sentry Certification exam by participating in a fun game.

9:45 AM - 11:15 AM

Training: Intro to Core PAS (001)

Level:
Beginner

Target Audience:
CyberArk Vault Administrators

Description:
In this session, attendees will learn about the functions of the core components of the CyberArk Privileged Access Security Solution and the role they play in creating robust privileged access security controls.

9:45 AM - 11:15 AM

Training: Intro to Core PAS (002)

Level:
Beginner

Target Audience:
CyberArk Vault Administrators

Description:
In this session, attendees will learn about the functions of the core components of the CyberArk Privileged Access Security Solution and the role they play in creating robust privileged access security controls.

9:45 AM - 11:15 AM

Training: Troubleshooting EPM (001)

Level:
Advanced

Target Audience:
CyberArk Endpoint Privilege Manager Administrators

Description:
In this session, attendees will learn of the advanced troubleshooting techniques used by CyberArk Support. Attendees will not only become more self-sufficient when attempting to resolve problems, but also will be able to work with CyberArk support more effectively, through better use of the Endpoint Privilege Manager (EPM) logs.

11:15 AM - 11:30 AM

Break

11:30 AM - 1:00 PM

CPM/PSM Customization for WebApps Lab (003)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

11:30 AM - 1:00 PM

CPM Customization for SSH Lab (002)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

11:30 AM - 1:00 PM

Accounts Discovery Lab (002)

Level:
Beginner

Target Audience:
Vault Administrators responsible for onboarding privileged accounts

Description:
In this lab, attendees will configure continuous discovery processes, and automatic onboarding rules to reduce unmanaged privileged accounts and access.

11:30 AM - 1:00 PM

Application Access Manager (AAM) for Developers with In-House Apps Lab (001)

Level:
Advanced

Target Audience:
Application Developers

Description:
In this lab, attendees will modify a preexisting Shell script to remove hard-coded credentials using the CyberArk Software Development Kit and Credential Provider.

11:30 AM - 1:00 PM

Training: Enforcing Least Privilege with OPM (001)

Level:
Intermediate

Target Audience:
CyberArk On-Demand Privileges Manage (OPM) Administrators.

Description:
In this session, attendees will learn how to use CyberArk’s On-Demand Privilege Manager (OPM) to enforce Least Privileged Principles on Unix and Linux servers.

11:30 AM - 1:00 PM

Training: Intro to PSM Suite (001)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this session, attendees looking to add Privileged Session Manager (PSM) to their CyberArk deployments will learn about the three flavors of PSM, their security benefits, and their affects on user workflows.

11:30 AM - 1:00 PM

Training: Intro to PSM Suite (002)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this session, attendees looking to add Privileged Session Manager (PSM) to their CyberArk deployments will learn about the three flavors of PSM, their security benefits, and their affects on user workflows.

11:30 AM - 1:00 PM

Training: PAS Fault Tolerance (001)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this session, attendees will learn about the various fault tolerance options for the Privileged Access Security architecture.

1:00 PM - 2:00 PM

Lunch

2:00 PM - 5:00 PM

Partner Business Sessions

These sessions examine the CyberArk differentiated partner value proposition and how partners can successfully grow their business with CyberArk; highlighting technologies, programs, resources and support available to CyberArk channel partners.
Sessions will cover:
• CyberArk’s partner value proposition
• Teaming with CyberArk for improved sales success
• CyberArk roundtable with Product Management, Marketing, Professional Services and Sales

2:00 PM - 3:30 PM

CPM/PSM Customization for WebApps Lab (004)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

2:00 PM - 3:30 PM

PSM Customization for Windows Apps Lab (002)

Level:
Intermediate

Target Audience:
Vault Administrators looking to extend the capabilities of Privileged Session Manager (PSM).

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

2:00 PM - 3:30 PM

EPM Policies Lab (002)

Level:
Intermediate

Target Audience:
Endpoint Privilege Manager (EPM) Administrators looking to get started on creating policies.

Description:
Attendees will gain hands-on experience with key features of EPM including: policy creation, ransomware protection, advanced credential theft detection and blocking, integration with CyberArk’s Privileged Threat Analytics (PTA) for advanced defense and real-time response, and using advanced policies to restrict and block application resource access to the internet.

2:00 PM - 3:30 PM

RestAPI Lab (002)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees will build a safe provisioning script using the CyberArk RestAPI.

2:00 PM - 3:30 PM

Training: Enforcing Least Privilege with EPM (001)

Level:
Beginner

Target Audience:
CyberArk Endpoint Privilege Manager (EPM) Administrators.

Description:
In this session, attendees will learn about several use cases of Endpoint Privilege Manager (EPM), including least privilege enforcement, credential theft protection, and application control. Students will learn to analyze the contents of the Inbox and decide on an appropriate policy for application discovered in their environment.

2:00 PM - 3:30 PM

Training: Intro to PTA (001)

Level:
Intermediate

Target Audience:
Anyone that is involved is a Privileged Access Security program

Description:
In this session, attendees that are interested in introducing additional controls to their Privileged Access Security programs, will gain a deeper technical understanding of the Privileged Threat Analytics (PTA). The session will cover use cases to detect, alert, and respond to attacks involving privileged access. The session will also include demos and examples of ways that PTA can protect against irreversible network take overs.

2:00 PM - 3:30 PM

Training: Securing Cloud Assets with CyberArk (001)

Level:
Intermediate

Target Audience:
CyberArk Vault Administrators

Description:
In this session, attendees will learn how to leverage the CyberArk Privileged Access Security Solution to protect their Cloud-based assets; covering AWS, Azure and Google Cloud Platform environments.

2:00 PM - 3:30 PM

Training: PAS Troubleshooting (002)

Level:
Advanced

Target Audience:
CyberArk Vault Administrators who are looking to become more self-sufficient when dealing with break/fix scenarios with CyberArk

Description:
In this session, attendees will learn about some of the advanced troubleshooting techniques used by CyberArk Support. Attendees will become more self-sufficient when attempting to resolve problems, and will also be able to make better use of the CyberArk logs.

2:00 PM - 5:30 PM

Best Practices for a Successful PAS Deployment

Join us for this half day workshop that cover topics such as building the business case for a Privileged Access Security program; defining governance and measurements; best practices for adoption and roll-out; and working with partners to accelerate adoption.

3:30 PM - 3:45 PM

Break

3:45 PM - 5:15 PM

CPM/PSM Customization for WebApps Lab (005)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

3:45 PM - 5:15 PM

CPM Customization for SSH Lab (003)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

3:45 PM - 5:15 PM

PTA Lab (001)

Level:
Beginner

Target Audience:
Anyone

Description:
In this lab, attendees will use, set up, and test automatic containment responses for security events involving risky commands in privileged sessions, and/or potential misuse of privileged access. Namely, attendees will set up and test automatic on-boarding of unmanaged privileged accounts, automatic password rotation in case of suspected credential theft, automatic password reconciliation for suspected password change, and session suspension in case of risky commands in a privileged session.

3:45 PM - 5:15 PM

Application Access Manager (AAM) for DevOps Lab (002)

Level:
Intermediate

Target Audience:
Privileged Access Security leaders and team members that will lead implementation projects to secure secrets used within DevOps pipelines and cloud native applications

Description:
In this lab, attendees will gain hands-on experience installing and implementing Conjur to support high-availability and fault tolerance. Additionally, attendees will learn basic administration functions to add and retrieve secrets, as well as how to integrate Conjur with the Enterprise Password Vault.

3:45 PM - 5:15 PM

Training: Getting Ready for your EPM Project (001)

Level:
Beginner

Target Audience:
CyberArk Endpoint Privilege Manager (EPM) Administrators

Description:
In this session, attendees will learn about best practices while running an Endpoint Privilege Manager project, from project planning and change management to high level configuration and setup.

3:45 PM - 5:15 PM

Training: PAS Administration for Beginners (001)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this session, attendees will get introduced to the various administration tools, configuration files, and log files, that are an essential part of any vault administrators’ day-to-day responsibilities.

3:45 PM - 5:15 PM

Training: Securing DevOps with Application Access Manager (AAM) (001)

Level:
Intermediate

Target Audience:
Privileged Access Security leaders and team members who need to lead secrets management projects to integrate with DevOps tools and cloud-native applications

Description:
In this session, attendees will learn the key features of Conjur and how to implement a base Conjur installation to support secrets management for the DevOps CI/CD tool chain and cloud-native applications.

3:45 PM - 5:15 PM

Training: Finding More with DNA (001)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this session, attendees will learn how to maximize what the CyberArk Discovery and Audit (DNA) tool is able to discover within their networks, and how to interpret the results and take action towards securing privileged access.

5:15 PM - 6:00 PM

Partner Cocktail Reception

Mix, mingle, and network with CyberArk executives and fellow partners during a private cocktail reception filled with lively conversation, food and refreshments.

6:00 PM - 8:00 PM

Welcome Reception & Discovery Center

All sessions open to Customers and Partners on this day.

8:00 AM - 6:00 PM

Certifications

CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/.

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED! Click here to learn more about what is available and to book your slot.

8:30 AM - 10:00 AM

Breakfast & Discovery Center

10:00 AM - 12:00 PM

Keynote Sessions

12:00 PM - 2:00 PM

Lunch & Discovery Center

2:00 PM - 2:45 PM

EPV Best Practices

During this session on Enterprise Password Vault (EPV), learn how to automatically discover, onboard and secure privileged accounts and credentials with the Enterprise Password Vault based on best practices from CyberArk experts. This session will cover how to set up continuous discovery and set policies to ensure proper access and management of privileged accounts.

2:00 PM - 2:45 PM

Azure Shadow Admins -You'd Better Catch them All

CyberArk Labs research revealed dangerous privilege escalation and persistence techniques in Azure and AWS. This talk springboards off of CyberArk Lab’s discovery. It will start with a background on Azure’s identity access management and its permission architecture. Then, we will detail stealthy techniques to escalate privileges to full admins in Azure environments. Expect some demos and an open source tool to help you around.

2:00 PM - 2:45 PM

The How and Why of Upgrading to v10

In this session, we will cover the how and why of upgrading to v10, featuring insights from customers who have upgraded to v10 along with best practices guidance from CyberArk experts.

2:00 PM - 2:45 PM

How to Stop Your Windows and Mac Workstations From Being Your Weakest Link

Workstation targeted attacks revolve around privilege, whether they are Windows-based or MacOS ones. As attackers aim for a foothold in your organization, they’re looking to steal credentials, manipulate applications, and move laterally across the network. In this session we will demonstrate common attacks against Windows and Mac workstations involving privilege and share how CyberArk solutions can be deployed to stop lateral movement from workstations.

2:00 PM - 2:45 PM

Federal Track: A Risk Based Approach to Insider Threat Detection for Federal Agencies

Malicious insiders have been and continue to be a major threat to the United States government. Regardless of motivation, when an insider decides to go rogue they can cause severe damage to an agency and, in some cases, even adversely impact the state of national security. Join us as we highlight how U.S. Federal Government agencies can put in place effective countermeasures to combat insider threats and provide granular level access to critical systems and applications, effectively manage authentication and monitor all privileged access activity.

2:00 PM - 2:45 PM

Developer Track: Securing Jenkins Secrets Across the CI/CD Pipeline

Jenkins is the biggest consumer and distributor of secrets in the DevOps ecosystem, but it leaves lots of ways to expose secrets and other sensitive information. We’ll go over all the ways Jenkins leaves secrets exposed and explore holistic approaches to fully secure Jenkins environments through secrets management, session isolation, monitoring and other best practices.

2:00 PM - 3:30 PM

Training: Password Management for New Vault Admins (001)

Level:
Beginner

Target Audience:
Beginning Vault Administrators

Description:
In this session, attendees will learn about Master Policy Settings and the various workflow processes they can implement for stored privileged credentials.

2:00 PM - 3:30 PM

Training: Intro to PTA (002)

Level:
Intermediate

Target Audience:
Anyone that is involved is a Privileged Access Security program

Description:
In this session, attendees that are interested in introducing additional controls to their Privileged Access Security programs, will gain a deeper technical understanding of the Privileged Threat Analytics (PTA). The session will cover use cases to detect, alert, and respond to attacks involving privileged access. The session will also include demos and examples of ways that PTA can protect against irreversible network take overs.

2:00 PM - 3:30 PM

CPM/PSM Customization for WebApps Lab (006)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

2:00 PM - 3:30 PM

CPM Customization for SSH Lab (004)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

2:00 PM - 3:30 PM

Accounts Discovery Lab (003)

Level:
Beginner

Target Audience:
Vault Administrators responsible for onboarding privileged accounts

Description:
In this lab, attendees will configure continuous discovery processes, and automatic onboarding rules to reduce unmanaged privileged accounts and access.

2:00 PM - 3:30 PM

PAS Troubleshooting Lab (001)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this lab, attendees will be given a simple task to perform in a prepared lab environment. However, several configuration issues will occur, and attendees will be challenged to use their troubleshooting skills, as well as their CyberArk support resources to find and resolve all issues and complete the task

2:45 PM - 3:30 PM

PSM Best Practices

During this session on Privileged Session Manager, learn best practices for isolating, recording and monitoring privileged sessions from CyberArk experts. This session will also cover how you can leverage the Privileged Session Manager for Cloud Connector to secure sessions for cloud, SaaS and on-prem web-based applications with a 100% native user experience.

2:45 PM - 3:30 PM

The HitchHiker's Guide to Jenkins: A DevOps Adventure

This session from CyberArk Labs will show hitchhikers how to recognize and categorize the Jenkins master server in the reconnaissance phase; how to launch unauthenticated attacks on the Jenkins master to drop security barriers and expose credentials; how to escalate privileges from a low-privileged user, such as a user with Overall/Read permissions, all the way to becoming a Jenkins admin; and, lastly,explore tips and tricks for playing with the Jenkins session mechanism and Active Directory integration.

2:45 PM - 3:30 PM

Customer Insights and Best Practices for Securing Cloud Based Applications and Infrastructure

In this session, you will have the unique opportunity to learn from first-hand, real-world scenarios related to privileged access security in cloud environments. Our panel of customers and CyberArk experts will provide insights from lessons learned securing commercial SaaS applications, cloud infrastructure and internal apps deployed in the cloud.

2:45 PM - 3:30 PM

Best Practices for Implementing Least Privilege on Windows and *NIX Servers

Many organizations already secure and manage admin access on Windows and *NIX Servers, but overlook additional measures to defend against privileged security risk on these commonly deployed systems. In this session, we will cover the fundamentals of least privilege on Windows and *NIX Servers and how CyberArk can automate the move into least privilege mode for critical assets.

2:45 PM - 3:30 PM

Federal Track: Providing Security in a World of Risk: How Privileged Access Security gets the job done for Federal Agencies

A 2018 “Federal Cybersecurity Risk Determination Report and Action Plan,” report by The White House’s Office of Management and Budget (OMB), in partnership with the Department of Homeland Security (DHS), paints a bleak picture of agency risk mitigation, indicating that 74 percent of agencies are either “At Risk” or “High Risk.” This report underscored the urgent need for change within Federal agencies in regard to their approach to security and how they handle cyber threats. Join us as we look at four key areas where agencies struggle and discuss a plan to address each and ig into the recommended guidelines and frameworks referenced in the report, such as FISM/NIST SP 800-53, NERC-CIP, HSPD-12 and the Department of Homeland Security CDM Program.

2:45 PM - 3:30 PM

Developer Track: Container Security Best Practices

What are the best practices for securing containers? We’ll address how to leverage CyberArk to implement container security best practices to keep you safe and your pipeline moving at velocity. We’ll also look at mistakes to avoid and demo KubiScan, a new open source tool from CyberArk that can detect and manage risky permissions.

3:30 PM - 4:00 PM

Break & Discovery Center

4:00 PM - 4:45 PM

PTA Best Practices

Join this best practices session to learn how you can leverage Privileged Threat Analytics (PTA) to simplify day to day management of your PAS program and prevent attacks involving privleged access.

4:00 PM - 4:45 PM

What Makes (or Breaks) a Credential Stealer

In this talk from CyberArk Labs, you will learn what it takes for a malware to become a credential stealer.
We’ll take a look at the inner workings of some of the most popular credential stealers of the last year or two and see what makes each special. Moreover, we’ll illustrate what attackers are doing with those stolen credentials after the attack and try to understand attackers incentives for writing this kind of malware.

4:00 PM - 4:45 PM

Customer Insights and Best Practices for Securing Endpoints with EPM

Join this session to learn from one customer’s experience building out a privileged program that secures more than 10,000 endpoints.  This session will also cover best practices from CyberArk experts.

4:00 PM - 4:45 PM

Securing the Robot Uprising: Protecting RPA Processes with CyberArk

Robotic process automation (RPA) is a powerful and emerging technology that streamlines and standardizes many human user processes. But, it also represents a new attack vector since organizations need to secure the privileged access used by software bots and RPA admins. In this session, we will cover:

1) An introduction to RPA and its benefits
2) Vulnerabilities attackers seek out in RPA deployments
3) Methods you can employ to proactively protect privileged credentials used by bots and humans
4) Best practices from real world customer deployments

4:00 PM - 4:45 PM

Federal Track: Three Must Haves for Taking Your Federal Agency to the Cloud

The cloud has long been a scary and untouchable place for certain industries and government agencies, but more and more organizations are warming up to the cloud due to it’s value, as well as the evolving market of security tools and capabilities that support it. Join us as we walk through why many enterprises and, now, government agencies are looking to the cloud to meet their IT needs. Learn about the benefits of the cloud, key features and use cases as well as important steps to take to minimize privileged access security risk as your agency moves to the cloud.

4:00 PM - 5:30 PM

Training: Accounts Onboarding (001)

Level:
Beginner

Target Audience:
Beginning Vault Administrators

Description:
In this session, attendees will learn several methods for discovering and vaulting privileged accounts, including strategies used to discover unmanaged privileged accounts in their environment.

4:00 PM - 5:30 PM

Training: Deploying CyberArk in the Cloud (001)

Level:
Intermediate

Target Audience:
CyberArk Vault Administrators

Description:
In this session, attendees will learn how to deploy CyberArk components securely in the cloud.

4:00 PM - 5:30 PM

CPM/PSM Customization for WebApps Lab (007)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

4:00 PM - 5:30 PM

PSM Customization for Windows Apps Lab (003)

Level:
Intermediate

Target Audience:
Vault Administrators looking to extend the capabilities of Privileged Session Manager (PSM).

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

4:00 PM - 5:30 PM

EPM Policies Lab (003)

Level:
Intermediate

Target Audience:
Endpoint Privilege Manager (EPM) Administrators looking to get started on creating policies.

Description:
Attendees will gain hands-on experience with key features of EPM including: policy creation, ransomware protection, advanced credential theft detection and blocking, integration with CyberArk’s Privileged Threat Analytics (PTA) for advanced defense and real-time response, and using advanced policies to restrict and block application resource access to the internet.

4:00 PM - 5:30 PM

Developer Track: Hands on Workshop: Securing Secrets in Jenkins and Kubernetes with Open Source

Is it true that all of the best things in life are open source? In this two part hands on workshop, you’ll use Conjur Open Source to secure secrets across Jenkins and Kubernetes. You’ll get to experience some of the best practices you learned earlier today and get practical tips for securing container environments. Developers from the Conjur team will be in the room to answer questions as you complete the workshop, and we’ll wrap it up with a developer to developer Q&A and t-shirt giveaway. This is a 90 minute session.

4:45 PM - 5:30 PM

Change Is Hard - Best Practices for Driving End User Adoption of PAS

Why do some programs move forward effortlessly, while others end up stuck? Join this session to learn from customers and CyberArk experts how to break through barriers and accelerate adoption of PAS at your organization. The session will include the sharing of content that you can customize for your end user security education and awareness efforts related to privileged access.

4:45 PM - 5:30 PM

Can you Escape This?

In this session, the CyberArk Labs team imitates the escapes performed by American master escape artist the Great Houdini. But, this time, CyberArk Labs will demonstrate escapes from real, live (privileged) container web sites. We will explain why containers are more susceptible to escapes compared to virtual machines and detail the different paths escapes can take from privileged containers to the host machine.

4:45 PM - 5:30 PM

Best Practices for Protecting your Applications with Application Access Manager

In this session, you will learn best practices for leveraging Application Access Manager to secure all types of application credentials from IT management and security software to applications driving digital transformation intiatives such as Robotics Process Automation, DevOps, and automation tools.

4:45 PM - 5:30 PM

Best Practices for Running PAS in AWS and Securing your AWS Environment

In this session, you will learn from customers and CyberArk experts best practices for running all or part of your PAS infrastructure in AWS and securing your AWS environment. The session will also cover how to leverage the AWS Security Hub and CyberArk Privileged Threat Analytics to detect and prevent attacks involving privileged access.

4:45 PM - 5:30 PM

Federal Track: Going Beyond the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program

The U.S. Department of Homeland Security is continuously looking for better ways to help federal agencies manage and secure their networks by providing guidance and resources such as those in the Continuous Diagnostics and Mitigation (CDM) program. The program provides the government with continuous monitoring capabilities for its computers and systems. Phase one was aimed at endpoint integrity, including the management of hardware and software assets, configuration management and vulnerability management. Phase two focuses on the people using the computers, systems and networks and their associated security privileges. This phase is called Least Privilege and Infrastructure Integrity and it is aimed at the management of access control, security-related behavior, privileges, credentials and authentication and boundary protection. Join us as we take a look at both of these phases and do a deep dive into phase two to understand how the CyberArk Privileged Access Security Solution addresses and goes beyond these requirements.

5:30 PM - 7:00 PM

Discovery Center Happy Hour

7:30 PM - 10:30 PM

CyberArk Party!

7:00 AM - 9:00 AM

Breakfast & Discovery Center

7:30 AM - 9:00 AM

Training: Password Management for New Vault Admins (002)

Level:
Beginner

Target Audience:
Beginning Vault Administrators.

Description:
In this session, attendees will learn about Master Policy Settings and the various workflow processes they can implement for stored privileged credentials.

7:30 AM - 9:00 AM

Securing In-House Apps with Application Access Manager (AAM) (001)

Level:
Advanced

Target Audience:
For Advanced Administrators of Privileged Access Security who need to lead Application Access Manager (AAM) integration projects

Description:
In this session, attendees will learn about the Application Access Manager (AAM) Credential Provider, Central Credential Provider, and Application Security Credential Provider’s capabilities to secure credentials used by third-party applications. Attendees will discover several AAM use cases that they can implement to improve their organization’s security posture.

7:30 AM - 9:00 AM

CPM/PSM Customization for WebApps Lab (008)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

7:30 AM - 9:00 AM

PSM Customization for Windows Apps Lab (004)

Level:
Intermediate

Target Audience:
Vault Administrators looking to extend the capabilities of Privileged Session Manager (PSM).

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

7:30 AM - 9:00 AM

PAS Troubleshooting Lab (002)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this lab, attendees will be given a simple task to perform in a prepared lab environment. However, several configuration issues will occur, and attendees will be challenged to use their troubleshooting skills, as well as their CyberArk support resources to find and resolve all issues and complete the task

7:30 AM - 9:00 AM

RestAPI Lab (003)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees will build a safe provisioning script using the CyberArk RestAPI.

8:00 AM - 6:00 PM

Certifications

CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/.

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED! Click here to learn more about what is available and to book your slot.

9:00 AM - 11:00 AM

Keynote Sessions

9:00 AM - 12:00 PM

Password Management Lab (001)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this lab, attendees will configure several password management workflows and platforms including Dual Control, Exclusive Accounts, One Time Password accounts, Verify, Change, and Reconcile, using Windows, Unix, and Oracle accounts.

9:00 AM - 12:00 PM

Integrations Lab (001)

Level:
Intermediate

Target Audience:
Experienced Vault Admins or Beginner Partners

Description:
In this lab, attendees will configure several integrations with the Enterprise Password Vault including LDAP, secure SMTP, SNMP, and SIEM.

9:00 AM - 12:00 PM

PVWA/PSM Load Balancing Lab (001)

Level:
Advanced

Target Audience:
Advanced Partners or Vault Administrators

Description:
In this lab, attendees will create a load balanced environment for their Password Vault Web Access (PVWA) and Privileged Session Manager (PSM) servers.

9:00 AM - 12:00 PM

HA Installers Lab (001)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees will create a clustered vault environment using the CyberArk Clustered Vault Manager.

11:15 AM - 12:00 PM

Partner Spotlight Sessions

More info coming soon!

12:00 PM - 1:30 PM

Lunch & Discovery Center

1:30 PM - 2:15 PM

Customer Insights and Best Practices for Securing Cloud Based Applications and Infrastructure

In this session, you will have the unique opportunity to learn from first-hand, real-world scenarios related to privileged access security in cloud environments. Our panel of customers and CyberArk experts will provide insights from lessons learned securing commercial SaaS applications, cloud infrastructure and internal apps deployed in the cloud.

1:30 PM - 2:15 PM

Red Team Tales from the Trenches

In this session, the CyberArk Red Team will share lessons learned from recent Red Team engagements.

1:30 PM - 2:15 PM

An Intro to DevOps with CyberArk - Securing DevOps Environments 101

After a quick review of basic DevOps concepts and solutions, you’ll learn how to leverage the CyberArk solution portfolio to secure the non-human and human credentials used throughout DevOps and containerized environments. You’ll leave ready to start taking on the challenge of securing your organization’s DevOps environments.

1:30 PM - 3:00 PM

Training: CDE Virtual Shadow (001)

Level:
Intermediate

Target Audience:
This session is restricted to partners who have completed the coursework requirements for the CyberArk CDE certification.

Description:
In this session, attending partners will complete the shadowing requirement for their CyberArk CDE certification

1:30 PM - 3:00 PM

Training: Securing DevOps with Application Access Manager (AAM) (002)

Level:
Intermediate

Target Audience:
Privileged Access Security leaders and team members who need to lead secrets management projects to integrate with DevOps tools and cloud-native applications

Description:
In this session, attendees will learn the key features of Conjur and how to implement a base Conjur installation to support secrets management for the DevOps CI/CD tool chain and cloud-native applications.

1:30 PM - 3:00 PM

CPM/PSM Customization for WebApps Lab (009)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

1:30 PM - 3:00 PM

CPM Customization for SSH Lab (005)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

1:30 PM - 3:00 PM

EPM Policies Lab (004)

Level:
Intermediate

Target Audience:
Endpoint Privilege Manager (EPM) Administrators looking to get started on creating policies.

Description:
Attendees will gain hands-on experience with key features of EPM including: policy creation, ransomware protection, advanced credential theft detection and blocking, integration with CyberArk’s Privileged Threat Analytics (PTA) for advanced defense and real-time response, and using advanced policies to restrict and block application resource access to the internet.

1:30 PM - 3:00 PM

Application Access Manager (AAM) for DevOps Lab (003)

Level:
Intermediate

Target Audience:
Privileged Access Security leaders and team members that will lead implementation projects to secure secrets used within DevOps pipelines and cloud native applications

Description:
In this lab, attendees will gain hands-on experience installing and implementing Conjur to support high-availability and fault tolerance. Additionally, attendees will learn basic administration functions to add and retrieve secrets, as well as how to integrate Conjur with the Enterprise Password Vault.

2:15 PM - 3:00 PM

Capture the Flag Solution Reveal

This CyberArk Lab sessions will reveal the solutions to the Capture the Flag challenges introduced at the beginning of Impact. Winners will also be announced during this session!

2:15 PM - 3:00 PM

Security at Inception: Best Practices for Managing the Credential Lifecycle with REST APIs and Automation

The process of onboarding privileged credentials is a critical step in building a successful PAS program. However, many organizations complete this task as human-driven process, which leaves it exposed to delays and errors. Let’s put those humans back to work in critical thinking roles and leverage APIs and automation to build security into the inception of privileged credentials.
In this session, you will learn:

1. How the REST API can be used to improve onboarding efficiency, data accuracy and security posture
2. Recommended approaches to building automated credential onboarding and lifecycle management through the use of orchestration tools, request systems and scripts and integration with CMDBs
3. What resources are available for you to begin your automation journey

2:15 PM - 3:00 PM

DevOps Deep Dive for Security Professionals

You’ve seen the presentations, but you really want to experience the code and maybe even try it yourself. Security professionals will get to the next level in this demo-heavy session — from launching a secrets management platform to securing a Jenkins environment. You’ll leave better prepared to help developers secure their code.

3:00 PM - 3:30 PM

Break & Discovery Center

3:30 PM - 12:30 AM

Partner Exclusive TechJam

Experience a one-of-a kind exclusive partner event that takes you deeper into the technical realm than ever before – all while enjoying a spectacular evening of festivities that include food, drinks, and special prizes.

TechJam is designed especially for CyberArk Certified Pre-Sales Engineers (CPE), letting you put your skills to the test to create prescriptive, proactive and preventative solutions to today’s most challenging security breaches. You’ll team up with CyberArk experts and build your skills, giving you the confidence to deliver the same level of risk mitigation techniques as our own CyberArk security experts.

This partner-only event is for CyberArk Certified Pre-Sales Engineers (CPEs) or Certified Delivery Engineers, so make sure you get certified on Tuesday, July 16 if you are not already! Credentials will be validated at the door.

3:30 PM - 4:15 PM

EPV Best Practices

During this session on Enterprise Password Vault (EPV), learn how to automatically discover, onboard and secure privileged accounts and credentials with the Enterprise Password Vault based on best practices from CyberArk experts. This session will cover how to set up continuous discovery and set policies to ensure proper access and management of privileged accounts.

3:30 PM - 4:15 PM

Malware in Pictures

Malware can vary a lot from nation state actors to script kiddies used by apprentice hackers. In this talk, the CyberArk Labs team will review different types of malware using photos and snapshots from their execution flow. What were the most interesting malware of 2018? What were their targets? What sets one apart from the other? Where might malware be going in the near future?

3:30 PM - 4:15 PM

Best Practices for Running PAS in AWS and Securing your AWS Environment

In this session, you will learn from customers and CyberArk experts best practices for running all or part of your PAS infrastructure in AWS and securing your AWS Environment. The session will also cover how to leverage the AWS Security Hub and CyberArk Privileged Threat Analytics to detect and prevent attacks involving privileged access.

3:30 PM - 5:00 PM

Training: Accounts Onboarding (002)

Level:
Beginner

Target Audience:
Beginning Vault Administrators

Description:
In this session, attendees will learn several methods for discovering and vaulting privileged accounts, including strategies used to discover unmanaged privileged accounts in their environment.

3:30 PM - 5:00 PM

Training: Securing In-House Apps with Application Access Manager (AAM) (002)

Level:
Advanced

Target Audience:
For Advanced Administrators of Privileged Access Security who need to lead Application Access Manager (AAM) integration projects

Description:
In this session, attendees will learn about the Application Access Manager (AAM) Credential Provider, Central Credential Provider, and Application Security Credential Provider’s capabilities to secure credentials used by third-party applications. Attendees will discover several AAM use cases that they can implement to improve their organization’s security posture.

3:30 PM - 5:00 PM

CPM/PSM Customization for WebApps Lab (010)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

3:30 PM - 5:00 PM

PSM Customization for Windows Apps Lab (005)

Level:
Intermediate

Target Audience:
Vault Administrators looking to extend the capabilities of Privileged Session Manager (PSM).

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

3:30 PM - 5:00 PM

PTA Lab (002)

Level:
Beginner

Target Audience:
Anyone

Description:
In this lab, attendees will use, set up, and test automatic containment responses for security events involving risky commands in privileged sessions, and/or potential misuse of privileged access. Namely, attendees will set up and test automatic on-boarding of unmanaged privileged accounts, automatic password rotation in case of suspected credential theft, automatic password reconciliation for suspected password change, and session suspension in case of risky commands in a privileged session.

3:30 PM - 5:00 PM

Application Access Manager (AAM) for Developers with In-House Apps Lab (002)

Level:
Advanced

Target Audience:
Application Developers

Description:
In this lab, attendees will modify a preexisting Shell script to remove hard-coded credentials using the CyberArk Software Development Kit and Credential Provider.

4:15 PM - 5:00 PM

PSM Best Practices

During this session on Privilege Session Manager (PSM), learn best practices for isolating, recording and monitoring privileged sessions from CyberArk experts. This session will also cover how you can leverage the Privileged Session Manager for Cloud Connector to secure sessions for cloud, SaaS and on-prem web-based applications with a 100% native user experience.

4:15 PM - 5:00 PM

What Makes (or Breaks) a Credential Stealer

In this talk from CyberArk Labs, you will learn what it takes for a malware to become a credential stealer.
We’ll take a look at the inner workings of some of the most popular credential stealers of the last year or two and see what makes each special. Moreover, we’ll illustrate what attackers are doing with those stolen credentials after the attack and try to understand attackers incentives for writing this kind of malware.

4:15 PM - 5:00 PM

Getting the Most Out of the CyberArk Tech Community

Learn how to get the most out of the CyberArk Tech Community during this engaging session with the CyberArk Tech Community experts.

5:00 PM

Free Night in Chicago!

All sessions open to Customers and Partners on this day.

7:00 AM - 9:00 AM

Breakfast

8:00 AM - 12:00 PM

Certifications

CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/.

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED! Click here to learn more about what is available and to book your slot.

8:00 AM - 9:30 AM

Training: PAS Troubleshooting (003)

Level:
Advanced

Target Audience:
CyberArk Vault Administrators who are looking to become more self-sufficient when dealing with break/fix scenarios with CyberArk

Description:
In this session, attendees will learn about some of the advanced troubleshooting techniques used by CyberArk Support. Attendees will become more self-sufficient when attempting to resolve problems, and will also be able to make better use of the CyberArk logs.

8:00 AM - 9:30 AM

Training: Enforcing Least Privilege with EPM (002)

Level:
Beginner

Target Audience:
CyberArk Endpoint Privilege Manager (EPM) Administrators.

Description:
In this session, attendees will learn about several use cases of Endpoint Privilege Manager (EPM), including least privilege enforcement, credential theft protection, and application control. Students will learn to analyze the contents of the Inbox and decide on an appropriate policy for application discovered in their environment.

8:00 AM - 9:30 AM

Training: PAS Fault Tolerance (002)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this session, attendees will learn about the various fault tolerance options for the Privileged Access Security architecture.

8:00 AM - 9:30 AM

Training: Finding More with DNA (002)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this session, attendees will learn how to maximize what the CyberArk Discovery and Audit (DNA) tool is able to discover within their networks, and how to interpret the results and take action towards securing privileged access.

8:00 AM - 9:30 AM

CPM/PSM Customization for WebApps Lab (011)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

8:00 AM - 9:30 AM

CPM Customization for SSH Lab (006)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

8:00 AM - 9:30 AM

Accounts Discovery Lab (004)

Level:
Beginner

Target Audience:
Vault Administrators responsible for onboarding privileged accounts

Description:
In this lab, attendees will configure continuous discovery processes, and automatic onboarding rules to reduce unmanaged privileged accounts and access.

8:00 AM - 9:30 AM

RestAPI Lab (004)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees will build a safe provisioning script using the CyberArk RestAPI.

9:30 AM - 9:45 AM

Break

9:45 AM - 11:15 AM

Training: Securing DevOps with Application Access Manager (AAM) (003)

Level:
Intermediate

Target Audience:
Privileged Access Security leaders and team members who need to lead secrets management projects to integrate with DevOps tools and cloud-native applications

Description:
In this session, attendees will learn the key features of Conjur and how to implement a base Conjur installation to support secrets management for the DevOps CI/CD tool chain and cloud-native applications.

9:45 AM - 11:15 AM

Training: Getting Ready for your EPM Project (002)

Level:
Beginner

Target Audience:
CyberArk Endpoint Privilege Manager (EPM) Administrators

Description:
In this session, attendees will learn about best practices while running an Endpoint Privilege Manager project, from project planning and change management to high level configuration and setup.

9:45 AM - 11:15 AM

Training: PAS Fault Tolerance (003)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this session, attendees will learn about the various fault tolerance options for the Privileged Access Security architecture.

9:45 AM - 11:15 AM

Training: Intro to PSM Suite (003)

Level:
Beginner

Target Audience:
Vault Administrators

Description:
In this session, attendees looking to add Privileged Session Manager (PSM) to their CyberArk deployments will learn about the three flavors of PSM, their security benefits, and their affects on user workflows.

9:45 AM - 11:15 AM

CPM/PSM Customization for WebApps Lab (012)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

9:45 AM - 11:15 AM

PSM Customization for Windows Apps Lab (006)

Level:
Intermediate

Target Audience:
Vault Administrators looking to extend the capabilities of Privileged Session Manager (PSM).

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

9:45 AM - 11:15 AM

EPM Policies Lab (005)

Level:
Intermediate

Target Audience:
Endpoint Privilege Manager (EPM) Administrators looking to get started on creating policies.

Description:
Attendees will gain hands-on experience with key features of EPM including: policy creation, ransomware protection, advanced credential theft detection and blocking, integration with CyberArk’s Privileged Threat Analytics (PTA) for advanced defense and real-time response, and using advanced policies to restrict and block application resource access to the internet.

9:45 AM - 11:15 AM

Application Access Manager (AAM) for DevOps Lab (004)

Level:
Intermediate

Target Audience:
Privileged Access Security leaders and team members that will lead implementation projects to secure secrets used within DevOps pipelines and cloud native applications

Description:
In this lab, attendees will gain hands-on experience installing and implementing Conjur to support high-availability and fault tolerance. Additionally, attendees will learn basic administration functions to add and retrieve secrets, as well as how to integrate Conjur with the Enterprise Password Vault.

11:15 AM - 11:30 AM

Break

11:30 AM - 1:00 PM

Training: Preventing Ransomware and Credential Theft with EPM (001)

Level:
Intermediate

Target Audience:
CyberArk Endpoint Privilege Manager (EPM) Administrators.

Description:
In this session, attendees will learn how to use Endpoint Privilege Manager (EPM) to protect against credential theft, ransomware and additional advanced protections like restricting application access. The session will cover, among other things, how EPM can be leveraged to prevent file-less malware attacks that use PowerShell to access the internet.

11:30 AM - 1:00 PM

CPM/PSM Customization for WebApps Lab (013)

Level:
Advanced

Target Audience:
Vault Administrators

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

11:30 AM - 1:00 PM

PSM Customization for Windows Apps Lab (007)

Level:
Intermediate

Target Audience:
Vault Administrators looking to extend the capabilities of Privileged Session Manager (PSM).

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

11:30 AM - 1:00 PM

PTA Lab (003)

Level:
Beginner

Target Audience:
Anyone

Description:
In this lab, attendees will use, set up, and test automatic containment responses for security events involving risky commands in privileged sessions, and/or potential misuse of privileged access. Namely, attendees will set up and test automatic on-boarding of unmanaged privileged accounts, automatic password rotation in case of suspected credential theft, automatic password reconciliation for suspected password change, and session suspension in case of risky commands in a privileged session.

11:30 AM - 1:00 PM

Application Access Manager (AAM) for Developers with In-House Apps Lab (003)

Level:
Advanced

Target Audience:
Application Developers

Description:
In this lab, attendees will modify a preexisting Shell script to remove hard-coded credentials using the CyberArk Software Development Kit and Credential Provider.

1:00 PM - 2:00 PM

Lunch