Skip to main content

Your Essential Services Are Belong to Us

As threat actors continue to innovate by leveraging new technologies and exploiting those already used in their target organisation, defenders must learn and collaborate to break the cycle. Hear how the CyberArk Red Team helps customers stay secure by thinking like an attacker and targeting Identities.​

Watch this session to see how the team were able to access a SWIFT environment, an OT infrastructure and IOT system all by (mis)using the day to day toolsets found in any IT organisation. Then see how CyberArk customers are taking on this guidance to deploy the most impactful security controls to stay safe.​

Shay Nahari, VP, Red Team Services, CyberArk​

Guest speakers:​

Jamie Rossato, Information Security Director, Lion​

John Mihalis, Cyber Security Consultant"