Identity protection as the key to Organization Security

2021-03-19

CyberArk webinars 2021

New reality of 2020 changed not only the way we behave in everyday life, but also the way we perform professional tasks.

Adoption of remote Access for everyone, security policy adjustment for new reality, logical network perimeter shift to the users' indentity are just examples of business aspects caused by pandemic.

Remote work, compared to the classic office model, creates new threats landscape. Protection of the user's identity has become the key and one of the most important aspects of entire organization security.

Join the CyberArk experts on the series of webinars and learn more about threats, security trends and identity protection comprehensive approach for business and technical (privileged) employees.

Register today!

Schedule of metings:

    Date Time Topic Description Registration
    08.04.2021 10:00 CEST Security trends in the context of identity protection

    During the meeting, we will cover topics related to security trends and problems observed in the Region.

    The session will have a form of discussion panel where invited experts will share their observations and thoughts.

     Registration closed
    22.04.2021 10:00 CEST

    Secure and ergonomic remote access for business and technical staff

    Conventional remote access (based on VPN technology) often does not address business and technical needs, such as: quick and easy Access and User Provisioning, security aspects, administrative overhead related to maintaining security policy and reconfiguration of the environment, etc.

    During the meeting we will introduce to you a new strategy for remote Access that covers all above-mentioned aspects and more.

    << LINK >>
    13.05.2021 10:00 CEST

    The new vision for cloud environments protection

    Digital transformation is currently not only a plan for the distant future, but often a project already started in many Organizations. Cloud environments and cloud identities (both: people and machines) protection is a fundamental aspect that should be paid attention to.

    During the session we will focus on how to develop an effective security strategy for cloud environments.

    << LINK >>
    27.05.2021 10:00 CEST

    Workstation as a hotspot for most modern attacks - principles of effective user workplace protection

    Recent security incidents analysis undercover common patterns and methodologies used during various attacks and campaigns carried out by cybercriminals.

    Escalation of rights, launching an unauthorized applications, credentials theft, lateral and vertical movements between systems are just some of the techniques that have remained unchanged in concept and effectiveness for years.

    Please join us and learn how to protect users work environment and identity in the new, comprehensive way.

    << LINK >>