Gartner projects that in 2022, Endpoint Protection Platforms will take the #1 spot in information security software spending, reaching $15.9B and will continue increasing gap with the second largest segment throughout 2026 reaching $29.2B.
Will this increase in spend result in a decrease in successful endpoint attacks? Historically, it hasn't been the case. So, what's missing? Foundational controls are being ignored, leaving open an endpoint security gap that means: If you are not managing endpoint privileges, you are leaving the door open to attackers.
Join this expert panel to discuss topics such as:
-How the current geo-political climate is exposing the endpoint privilege gap and what it means for security teams on the front lines
-The limitations of commonly adopted endpoint security software
-How removing local admin rights and enforcing least privilege on every endpoint helps shape the defense-in-depth strategy
-Tips for implementing and enforcing endpoint least privilege from a current CyberArk customer
-The benefits of endpoint privilege management, beyond enhanced security
Recommended for You
47:23DORA, NIS2, and the UK's CAF v4.0 are all converging on the same uncomfortable question: \"Can you prove which machines accessed what resources, when, and why?\" For most organizations
36:11Always-on privileged access slows projects and raises risk. AI-driven lifecycle management fixes over/under‑provisioning with just‑right, time‑bound access.
28:48Retrieving data. Wait a few seconds and try to cut or copy again.
39:42This webinar breaks down five key identity trends to help CISOs adapt their security strategy for the modern, distributed, and AI-powered world.
32:18Learn how a unified identity security approach delivers deep protection and strong alignment with CISO and SOC priorities.
44:14Discover what Ponemon’s new 2026 PKI research shows about legacy risks, manual workflows, and how to build a modern, resilient PKI program.
1:00:59Secrets are exploding across clouds. Learn how to discover, control, and eliminate secrets in 2026 with modern workload identity and CyberArk.
26:15Learn how a European bank built a compliant, resilient PAM program on CyberArk SaaS in a cloud-first environment.
31:32Stay ahead of rising compliance demands with stronger controls, automation, and identity security in Part 1: Compliance at Cloud Speed.
22:29Join Omdia’s Todd Thiemann and CyberArk’s Bruce Spooner in a fireside chat discussing how mid-market organizations can replace manual identity governance with modern, automated IGA
4:11Rising regulations like NIS2 and DORA demand control. Learn how Zero Standing Privileges simplify multi-cloud compliance and turn it into an advantage.
14:54Building a Modern Approach to Identity Governance
30:39In today’s hybrid enterprise, identities go far beyond employees. Contractors, apps, and even machines all need privileged access — and traditional governance can’t keep up.
15:59Orphaned accounts (inactive or unowned user identities that retain access to critical systems) represent one of the most overlooked security risks in modern enterprises.
1:12:02Join us to learn how CyberArk's solutions support the compliance of Hong Kong Critical Infrastructure Bill
37:35Learn how to secure identities across multi-cloud environments, meet global regulations, strengthen resilience, and protect sensitive workloads-all while maintaining speed and innovation.
47:52Learn to secure SaaS sessions with real-time monitoring and protection that won't disrupt your users.
35:04Learn why centralizing secrets strengthens governance and hear real-world horror stories with field-tested fixes—without disrupting your developers.
22:08Traditional Identity Governance and Administration (IGA) has long relied on static roles and labels—“Software Engineer,” “Sales Rep,” “Manager.” But in today’s dynamic business environment
26:16Learn how CyberArk Workforce Password Management integrates across the Identity Security Platform—and with third-party IdPs, PAM, Secure Web Sessions, and Enterprise Browser.



