Optiv and CyberArk, as security leaders within the DOD, have found there are significant challenges with securing privileged accounts and isolating associated activity within the Army. We have assembled key thought leaders to discuss how to enable zero trust architecture while still facilitating operational expediency for an Army specific webinar.
- Protecting privileged accounts and privileged machine identities
- Asserting multifactor for non-compliant devices and applications.
- Compliance with the RMF framework
- Automate the management of service account password rotation within STIG requirements