Premiering Feb. 19: CyberArk Webinar on Top Security Projects Featuring Gartner’s Neil MacDonald

February 6, 2019 Jessica Sirkin

When it comes to picking the right security projects, Neil MacDonald, Gartner vice president and distinguished analyst, knows exactly where to start — “Focus on projects that reduce the most amount of risk and have the largest business impact,” he said.1

Gartner’s information security team did just that when they assembled their top ten recommendations for security projects. The team went through dozens of submissions for top security project and stack ranked them as a team before they selected privileged access management as their top project.

On Tuesday, February 19, CyberArk will present the webinar “Top Security Projects for Security and Risk Management Organizations.” It features Gartner’s Neil MacDonald and, Steven Preston, CyberArk’s vice president of corporate marketing. The webinar will examine Gartner’s top five security recommendations and how they made their choices.

The Gartner information security team began with a set of criteria for how to select their top projects. They had to be real projects – not programs. Every implementation on the list needed to have a start and end date. They also needed to be real technology. While the Gartner team wanted to advance newer technology, they also insisted that everything on the list be able to be budgeted and staffed within a year.

The number one priority for the top security projects was that they reduce risk. However, reducing risk wasn’t necessarily enough. CISOs often have a large number of projects to divide their budget or difficulty getting the staffing they need, so the projects needed to not just reduce risk, but reduce the most risk for the amount of resources they required.

Business impact made up the other half of the evaluation criteria. These projects also had to be the best in terms of their ability to help CISOs meet business their business objectives – whether those were enabling DevSecOps style development or keeping attackers out.

In the end, the security and risk team chose Privileged Access Management for the top spot because it was able to significantly reduce risk by making it harder for attackers to compromise privileged credentials.

Register here for the webinar premiere on Feb. 19.

Watch the webinar to find out how Gartner’s top five security recommendations can help you improve your business. Take a deep dive into the privileged access management space with the 2018 Gartner Magic Quadrant for Privileged Access Management2 report.


1Smarter with Gartner. “Top 10 Security Projects for 2018.” Jill Beadle. 6 June 2018.

2 Gartner, “Magic Quadrant for Privileged Access Management,” Felix Gaehtgens, Dale Gardner, Justin Taylor, Abhyuday Data, Michael Kelley, 3 December 2018.

Previous Article
Securing Privileged Access within Microsoft’s Enhanced Security Administrative Environments (ESAE)
Securing Privileged Access within Microsoft’s Enhanced Security Administrative Environments (ESAE)

Learn how CyberArk can help secure privileged access, create credential boundaries and provide enhanced aud...

Next Article
Protecting Critical Business Systems: Five SAP Use Cases Protected by CyberArk
Protecting Critical Business Systems: Five SAP Use Cases Protected by CyberArk

In November, we wrote a blog about the “7 types of privileged accounts you should know” to highlight potent...