Webinars

  • Why Identity and Segregation of Duties are The New Perimeter52:01

    Why Identity and Segregation of Duties are The New Perimeter

    IGA experts discuss the evolving security perimeter amid growing applications, remote access, users, and permissions in today’s enterprise environments.

    Watch Video
  • CyberArk Named a Leader in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • Segregation of Duties16:43

    Segregation of Duties

    This presentation discusses Segregation of Duties risks, real-world failures like the Société Générale scandal, and showcases Zilla’s identity security platform.

    Watch Video
  • Deep dive into service account security11:07

    Deep dive into service account security

    Zilla’s talk explores the hidden risks of service accounts, offering guidance on managing and securing these often-overlooked non-human identities.

    Watch Video
  • Breakthrough Identity Governance Automation39:11

    Breakthrough Identity Governance Automation

    Zilla's tech talk presents AI-driven identity governance automation to streamline access reviews, provisioning, and identity operations.

    Watch Video
  • Check out our upcoming webinars!

    See Webinars
  • Incorporating Identity in Your Cloud Security Strategy52:55

    Incorporating Identity in Your Cloud Security Strategy

    Zilla and Guide Point leaders discuss key challenges and strategies for achieving effective identity management in modern cloud environments.

    Watch Video
  • Tackling job appropriate access31:33

    Tackling job appropriate access

    90% of identity leaders struggle with roles—this webinar explores an AI-driven, automated approach to delivering job-appropriate access at scale.

    Watch Video
  • Identity Governance Agony46:05

    Identity Governance Agony

    Zilla leaders and experts share 2025 IGA best practices and insights from a recent market research survey of identity leaders.

    Watch Video
  • Strengthen IT Compliance with Endpoint Identity Security22:54

    Strengthen IT Compliance with Endpoint Identity Security

    Discover how identity security can play a pivotal role in achieving and maintaining compliance on endpoints.

    Watch Video
  • Break Identity Silos to Maximize Risk Reduction39:05

    Break Identity Silos to Maximize Risk Reduction

    The advantages of an identity security platform & how to maximize risk reduction by managing and securing identities with appropriate privilege controls.

    Watch Video
  • 5 Strategies to Help Your Workforce Embrace Better Password Security27:59

    5 Strategies to Help Your Workforce Embrace Better Password Security

    Learn 5 proven strategies to boost adoption of your WPM tool and build secure, low-friction password habits across your workforce.

    Watch Video
  • You've got MFA?  Great, I can bypass that!37:11

    You've got MFA? Great, I can bypass that!

    MFA isn’t enough. Learn how attackers bypass it—and how to secure access beyond the login with Identity Security

    Watch Video
  • The Next Frontier in Identity Security: Machines, Secrets and AI19:19

    The Next Frontier in Identity Security: Machines, Secrets and AI

    Machine identity sprawl is rising. Hear expert insights from ESG and CISO tips to improve visibility, control, and security.

    Watch Video
  • Scattered Spider Tactics Revealed45:55

    Scattered Spider Tactics Revealed

    CyberArk experts uncover Scattered Spider’s latest identity attacks and review how to detect threats and defend against privilege abuse.

    Watch Video
  • The Countdown to 47 Days: Are You Ready for the Biggest Change in TLS Certificate Lifecycle Management?44:10

    The Countdown to 47 Days: Are You Ready for the Biggest Change in TLS Certificate Lifecycle Management?

    The CA/Browser Forum has approved sweeping changes to the TLS certificate lifecycle, reducing the maximum validity for public certificates to just 47 days, down from today’s 398.

    Watch Video
  • How to Prevent the Most Common Password-Related Attacks41:59

    How to Prevent the Most Common Password-Related Attacks

    Phishing and compromised credentials remain the leading causes of security breaches. Traditional passwords are not only vulnerable.

    Watch Video
  • Rethinking Workforce Access: Aligning Passwordless Innovation with Real-World Needs27:11

    Rethinking Workforce Access: Aligning Passwordless Innovation with Real-World Needs

    This guide explains what certificate lifecycle management (CLM) is and why it should be central to your machine identity security strategy.

    Watch Video
  • Check out our upcoming webinars!

    See Webinars
  • Machine Identity Security: Enabling Crypto-Agility for Your PQC-Journey55:25

    Machine Identity Security: Enabling Crypto-Agility for Your PQC-Journey

    In this session, attendees will review the progression of quantum computing along with industry recommendations to help agencies prepare for and transition to post quantum cryptography.

    Watch Video
  • A Defense-in-Depth Approach to Workforce Security32:26

    A Defense-in-Depth Approach to Workforce Security

    Traditional approaches to workforce identity security are no match for today's evolving threats. This session introduces a defense-in-depth strategy that reimagines how to secure workforce identities

    Watch Video
  • Mastering Access Reviews: An Auditor's Perspective48:49

    Mastering Access Reviews: An Auditor's Perspective

    Struggling with access reviews? Get expert tips on automation, catching hidden accounts, and staying audit-ready in this must-watch webinar.

    Watch Video
  • On The Road to Passwordless: Password Control in the Enterprise25:00

    On The Road to Passwordless: Password Control in the Enterprise

    Despite the shift toward passkeys and multi-factor authentication, many legacy and third-party apps still rely on passwords. To balance security and productivity, enterprises need effective password

    Watch Video
  • loading
    Loading More...