Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365: Header Desktop Cyber Ark
Launch Days Management I

Vision & Strategy to develop an expanded approach to PAM

Vision & Strategy to develop an expanded approach to securing identities in Privileged Access Management

calendar_today Tue, 06.10.2020, 15:30 - 15:45

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Awareness / Phishing / Fraud Cloud Security Data security / DLP / Know-how protection Endpoint Protection Governance, Riskmanagement and Compliance Identity and access management Network Security / Patch Management SIEM / Threat Analytics / SOC Trend topic

Event

This action is part of the event Launch Days

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

CyberArk - the global leader in privileged access management (PAM) - outlines the plan to develop an expanded approach to securing identities – one with privileged access management at its core. Building on the recent acquisition of Idaptive, CyberArk laid out an Identity Security strategy that starts with Zero Trust and uses artificial intelligence to understand context and intent. This approach will help organizations dramatically reduce risk while providing a seamless user experience that will enable the business and support any device, application or user in a secure manner— regardless of role or location. “In today’s mobile, digital and cloud world, all identities can become privileged under certain conditions. If not properly secured, they can open doors for attackers to execute increasingly targeted attacks,” Michael Kleist (Region Director DACH) will explain during his session. “Because of this new reality, the traditional approach to managing and securing identities has become obsolete. The identity is the new perimeter to protect. The incorporation of the Idaptive technology helps CyberArk extend its foundational strengths in privileged access management, a critical layer in delivering a security-first strategy for protecting access by a range of human, application and machine identities, and the services they consume.” This session is designed to help attendees develop their cybersecurity expertise and provide an overview on identity based security solutions for human and technical access to machines and applications, privileged access management for business and administrative accounts as well as secure devops environments. ... read more

Language: German

Questions and Answers: Yes

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.