×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Your Essential Services Are Belong to Us

September 29, 2023

As threat actors continue to innovate by leveraging new technologies and exploiting those already used in their target organisation, defenders must learn and collaborate to break the cycle. Hear how the CyberArk Red Team helps customers stay secure by thinking like an attacker and targeting Identities.​

Watch this session to see how the team were able to access a SWIFT environment, an OT infrastructure and IOT system all by (mis)using the day to day toolsets found in any IT organisation. Then see how CyberArk customers are taking on this guidance to deploy the most impactful security controls to stay safe.​

Shay Nahari, VP, Red Team Services, CyberArk​

Guest speakers:​

Jamie Rossato, Information Security Director, Lion​

John Mihalis, Cyber Security Consultant"

Previous Video
Collaborative ecosystems Tackling Identity Security challenges together
Collaborative ecosystems Tackling Identity Security challenges together

Panel discussion with Deloitte, The Missing Link, and Accenture: Industry insights, cyber resilience strate...

Next Video
With Great Power Comes Great Responsibility
With Great Power Comes Great Responsibility

Hear from Deloitte as they explore Australia's evolving energy landscape and the challenges in securing exp...