CyberArk to Address Advanced Cyber Threats at GTRA Technology Council Meeting

Panel Presentation and Roundtable to Help Government IT Leaders Reduce APT Exposure By Protecting Privileged Accounts

Cambridge, Md. - May 31, 2013 - CyberArk today announced details of its upcoming participation at the GTRA June Technology Council Meeting. CyberArk's Adam Bosnian will join industry leaders on the "Sustainability in the New IT Ecosystem: Critical Success Factors for Today & Key Preparations for Tomorrow" panel to address the theft, misuse and exploitation privileged accounts, a key tactic in each phase of an Advanced Persistent Threat (APT) attack cycle. In addition, CyberArk will host a roundtable dedicated to the discussion of the importance of managing privileged accounts in accordance with NIST 800-53 Rev 4. CyberArk's Privileged Identity Management Suite was also nominated for a GOVTek Award for Best Security Solution. Winners will be announced on June 2 at the GOVTek Awards Gala.

Who:

Adam Bosnian, Executive Vice President, Americas, CyberArk

David Lingenfelter, Fiberlink Security Officer, Maas360

Wallace Sann, Director, Systems Engineering, Forescout

Steve Antone, VP, Federal Solutions, Lumension

MODERATOR: Parham Eftekhari, EVP, Research & Co-Founder, GTRA

What:

Panel: Sustainability in the New IT Ecosystem: Critical Success Factors for Today & Key Preparations for Tomorrow

 

Roundtable: The Impact of Automating Privileged Controls to Address NIST 800-53 Rev 4 and Meet the Increasing Advanced Threat Landscape

In the CyberArk session, attendees will participate in a dialogue on the existence, prevalence and risk of unmanaged privileged accounts in a traditional IT organization. The conversation will focus on how best to define, implement and track controls in order to stop inadvertent or malicious misuse of these powerful accounts and pathways. The risk posed by unmanaged, powerful privileged accounts, from both a compliance and a pure security perspective, is magnified by the anonymity of the privileged user or application and the opacity of the corresponding actions. Privileged controls, when properly designed and made operational, directly reduce the overall security risk an organization faces from advanced attacks while ensuring continuous usage of the recommended controls surrounding privileged accounts that are detailed extensively in Rev 4 of the NIST Special Publication 800-53.

When:

Monday, June 3, 2013 at 4:30 p.m. ET

Where:

Chesapeake A, Hyatt Regency Chesapeake Bay, Cambridge, Md.

For updates from the meeting follow CyberArk on Twitter: @CyberArk

About CyberArk
CyberArk® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity ManagementPrivileged Session Management andSensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments. CyberArk works with more than 1,200 customers, including more than 40 percent of the Fortune 100. Headquartered in Newton, Mass., CyberArk has offices and authorized partners in North America, Europe and Asia Pacific. For more information, please visit www.cyberark.com.

Friday, May 31, 2013 - 12:00