10 past events found
Back to Search Begin New Search Save Search Auto-Notify
CyberArk IMPACT World Tour - DC
CyberArk is taking the Identity Security conversation to the Washington, DC area during IMPACT World Tour. Join us and your Public Sector and industry peers in Tyson's Corner on April 3rd, to discuss the ever-expanding attack surface, the latest techniques in identity-based cyberattacks, and innovations in Identity Security technology. You'll walk away informed and inspired to take your Identity Security program to the next level. Who should a...
April 3, 2024
Organizer: Merlin Cyber
Location: McLean, VA
Add Favorite
IMPACT 2022
Across three days, you’ll immerse yourself in expert-led trainings, discuss the latest in cybersecurity solutions and network with industry leaders. Learn proven best practices to help you move fearlessly forward only at Impact 2022.
July 12-14, 2022
Organizer: CyberArk
Location: Boston, MA
Add Favorite
How Defending Against Ransomware Goes B...
Ransomware attacks have been making headlines again and again. Ransomware evolves and new ones are not only encrypting data and damaging business continuity, but they have also lead to public data leaks of confidential information. CyberArk's solution enables to mitigate the risk related to ransomware by implementing the least privilege approach and credential theft protection to prevent the attack on the machines where it lands, combined with...
October 14, 2021
Organizer: CyberArk Government Team at Carahsoft
Location: Webcast
Add Favorite
Least Privilege Throughout the Cloud Mi...
Digital transformation doesn't stop. Whether your organizations are just beginning their cloud migration or operate complex, multi-cloud environments, they need guidance and solutions to protect against the leading case of breaches – compromised identities and credentials. Join CyberArk on Thursday, August 26th for a live webinar on how the principle of least privilege access can mitigate risks of cloud Identity and Access Management mis...
August 26, 2021
Organizer: CyberArk Government Team at Carahsoft
Location: Webcast
Add Favorite
Zero Trust in a Post-COVID World
Even as the pandemic eases, the changes it has wrought will last. Your people, employees, faculty staff, and students won't be 100% back on-site. Identity is your new perimeter. Old-school perimeter-based security relies on separating the "bad guys" from the "good guys". Zero Trust assumes that the bad guys are already in your network and have access to your applications and systems. Zero Trust works on the principle "never trust, always verif...
May 27, 2021
Organizer: CyberArk Government Team at Carahsoft
Location: Webcast
Add Favorite
The Power of Identity, Privilege & Car Racing
Bring something out of the ordinary to your crew! Join CyberArk, SailPoint, and the P.I.T. crew for a private virtual event with Robert Megennis, driver of the #27 Andretti Autosport Indy Lights Car. Get an insider’s look to the car racing world where we will share the keys to success for our team at the track, and your team at the office. Simultaneously, learn about the powers of identity and privilege from SailPoint and CyberArk. What...
November 17, 2020
Organizer: CyberArk Government Team at Carahsoft
Location: Webcast
Add Favorite
Cyberark Defend Los Angeles
Defend is a one-day clinic, led by CyberArk experts with extensive experience in real-life breach remediation efforts. During this event we’ll discuss topics including: Protecting against irreversible takeovers whether on-premise or in the cloud Removing security roadblocks from non-human IDs Providing seamless security for the development process PAS basics for achieving zero trust and protection again insider threats Security remote ac...
June 13, 2019
Organizer: Cyberark
Location: Los Angeles, CA
Add Favorite
Cyberark SJ Defend
Defend is a one-day clinic, led by CyberArk experts with extensive experience in real-life breach remediation efforts. During this event we’ll discuss topics including: Protecting against irreversible takeovers whether on-premise or in the cloud Removing security roadblocks from non-human IDs Providing seamless security for the development process PAS basics for achieving zero trust and protection again insider threats Security remote ac...
June 12, 2019
Organizer: Cyberark
Location: San Jose, CA
Add Favorite
Securing Your Privileged User Accounts
According to the findings of the recent 2017 Data Threat Report, 59% of the U.S. federal government respondents cited privileged users as the most dangerous insider threat. Cyber criminals launch sophisticated attacks to gain access to, and exploit insider privileges. Once they have privileged credentials, they are difficult to detect and can do irreparable damage. Our on demand webcast will highlight a typical use case to illustrate how the...
November 14, 2017
Organizer: Thales Government Team at Carahsoft
Location: Webcast
Add Favorite
Why Behavior is the Most Important Aspe...
The new battleground for information security is inside your network. Perimeter security, such as firewalls and anti-malware, remain a necessary and important component of every security strategy; however, the perpetrators of advanced, targeted threats are aggressively breaking through this front line of defense. Patient, cunning, and armed with the resources to succeed, they will eventually find their way inside your organization. In addition...
June 12, 2014
Organizer: CyberArk Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Back to Search Begin New Search