FULL AGENDA

Sessions that are only held once are indicated with an * in the title.

8:00 AM - 9:00 AM
Breakfast
9:00 AM - 10:30 AM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

9:00 AM - 10:30 AM
CPM Customization for SSH Lab

Level:
Advanced

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

9:00 AM - 10:30 AM
Application Access Manager (AAM) for DevOps Lab

Level:
Intermediate

Description:
In this lab, attendees will gain hands-on experience installing and implementing Conjur to support high-availability and fault tolerance. Additionally, attendees will learn basic administration functions to add and retrieve secrets, as well as how to integrate Conjur with the Enterprise Password Vault.

9:00 AM - 10:30 AM
Accounts Discovery Lab

Level:
Beginner

Description:
In this lab, attendees will configure continuous discovery processes, and automatic onboarding rules to reduce unmanaged privileged accounts and access.

9:00 AM - 10:30 AM
Training: Defender Exam Prep

Level:
Intermediate

Description:
In this session, attendees will practice for the CyberArk Defender Certification exam by participating in a fun game.

9:00 AM - 10:30 AM
Training: Intro to Privileged Access Security

Level:
Beginner

Description:
In this session, attendees will learn the business cases for implementing a privileged access security program.

9:00 AM - 10:30 AM
Training: Enforcing Least Privilege with OPM

Level:
Intermediate

Description:
In this session, attendees will learn how to use CyberArk's On-Demand Privilege Manager (OPM) to enforce Least Privileged Principles on Unix and Linux servers.

9:00 AM - 10:30 AM
Training: Securing DevOps Applications with AAM

Level:
Intermediate

Description:
In this session, attendees will learn the key features of Conjur and how to implement a base Conjur installation to support secrets management for the DevOps CI/CD tool chain and cloud-native applications.

10:00 AM - 6:00 PM
Certifications

CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/.

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED! Click here to learn more about what is available and to book your slot.

10:30 AM - 10:45 AM
Break
10:45 AM - 12:15 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

10:45 AM - 12:15 PM
PSM Customization for Windows Apps Lab

Level:
Intermediate

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

10:45 AM - 12:15 PM
Application Access Manager (AAM) for In-House Apps Lab

Level:
Advanced

Description:
In this lab, attendees will modify a preexisting Shell script to remove hard-coded credentials using the CyberArk Software Development Kit and Credential Provider.

10:45 AM - 12:15 PM
PAS Troubleshooting Challenge

Level:
Advanced

Description:
In this lab, attendees will be given a simple task to perform in a prepared lab environment. However, several configuration issues will occur, and attendees will be challenged to use their troubleshooting skills, as well as their CyberArk support resources to find and resolve all issues and complete the task.

10:45 AM - 12:15 PM
Training: Sentry Exam Prep

Level:
Intermediate

Description:
In this session, attendees will practice for the CyberArk Sentry Certification exam by participating in a fun game.

10:45 AM - 12:15 PM
Training: PAS Administration for Beginners

Level:
Beginner

Description:
In this session, attendees will get introduced to the various administration tools, configuration files, and log files, that are an essential part of any vault administrators' day-to-day responsibilities.

10:45 AM - 12:15 PM
Training: Enforcing Least Privilege with EPM

Level:
Beginner

Description:
In this session, attendees will learn about several use cases of Endpoint Privilege Manager (EPM), including least privilege enforcement, credential theft protection, and application control. Students will learn to analyze the contents of the Inbox and decide on an appropriate policy for application discovered in their environment

10:45 AM - 12:15 PM
Training: Securing In-House Applications with AAM

Level:
Advanced

Description:
In this session, attendees will learn about the Application Access Manager (AAM) Credential Provider, Central Credential Provider, and Application Security Credential Provider's capabilities to secure credentials used by third-party applications. Attendees will discover several AAM use cases that they can implement to improve their organization's security posture.

12:15 PM - 1:15 PM
Lunch
1:00 PM - 3:20 PM
Partner Keynotes

Level:
Non-Technical

Description:
1:00 - 1:20 PM - Welcome and Introductions

1:20 – 1:50 PM – Market Direction – This session will cover market insights and trends for Privileged Access Management.

1:50 – 2:20 PM – Company Direction - This session will discuss emerging business opportunities in the broader identity and access management space.

2:20 – 2:50 PM – Executive Panel – Hear from CyberArk executives on this insightful panel.

2:50 – 3:20 PM – Break and transition to Partner breakout sessions

1:15 PM - 2:45 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

1:15 PM - 2:45 PM
CPM Customization for SSH Lab

Level:
Advanced

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

1:15 PM - 2:45 PM
RestAPI Lab

Level:
Advanced

Description:
In this lab, attendees will use the CyberArk RestAPI for different use cases

1:15 PM - 2:45 PM
Password Management Lab

Level:
Beginner

Description:
In this lab attendees will setup platform and Master Policy settings to manage a number of differnent types of accounts. Then they will onboard test accounts to ensure password management is working as planned.

1:15 PM - 2:45 PM
Training: Advanced Troubleshooting and Log Analysis

Level:
Intermediate

Description:
In this session attendees will learn some of the advanced troubleshooting techniques used by CyberArk Support.

1:15 PM - 2:45 PM
Training: PSM Suite Overview

Level:
Beginner

Description:
In this session, attendees looking to add Privileged Session Manager (PSM) to their CyberArk deployments will learn about the three flavors of PSM, their security benefits, and their effects on user workflows.

1:15 PM - 2:45 PM
Training: Preventing Ransomware and Credential Theft with EPM

Level:
Intermediate

Description:
In this session, attendees will learn how to use Endpoint Privilege Manager (EPM) to protect against credential theft, ransomware and additional advanced protections like restricting application access. The session will cover, among other things, how EPM can be leveraged to prevent file-less malware attacks that use PowerShell to access the internet.

1:15 PM - 2:45 PM
Training: Managing the Account Lifecycle

Level:
Beginner

Description:
In this session attendees will learn how to use the accounts discovery features of CyberArk and the RestAPI to manage a privileged account throughout its entire lifecycle.

2:45 PM - 3:00 PM
Break
3:00 PM - 4:30 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

3:00 PM - 4:30 PM
PSM Customization for Windows Apps Lab

Level:
Intermediate

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

3:00 PM - 4:30 PM
Zero Trust Just In Time Access Lab

Level:
Intermediate

Description:
In this lab attendees will setup CyberArk Alero and the Ad Hoc Access feature of Core PAS to create a Zero Trust Just In Time Access Solution.

3:00 PM - 4:30 PM
PAS Fault Tolerance Lab

Level:
Intermediate

Description:
In this lab attendee will setup some of CyberArk's Vault Fault Tolerance features including HA and DR.

3:00 PM - 4:30 PM
Training: Fault Tolerant Architectures

Level:
Beginner

Description:
In this session, attendees will learn about the various fault tolerance options for the Privileged Access Security architecture.

3:00 PM - 4:30 PM
Training: PTA Overview

Level:
Beginner

Description:
In this session, attendees that are interested in introducing additional controls to their Privileged Access Security programs, will gain a deeper technical understanding of the Privileged Threat Analytics (PTA). The session will cover use cases to detect, alert, and respond to attacks involving privileged access. The session will also include demos and examples of ways that PTA can protect against irreversible network take overs.

3:00 PM - 4:30 PM
Training: Configuring Just In Time Access

Level:
Beginner

Description:
In this session attendee will learn about using the Ad Hoc Access Features of Core PAS to create Just In Time access for Administrators.

3:00 PM - 4:30 PM
Training: Getting Started with the RestAPI

Level:
Intermediate

Description:
To come.

3:20 PM - 4:20 PM
Partner Business Track

Level:
Non-Technical

Description:
3:20 - 3:50 PM - Building Demand Programs for Privileged Access Security In this session, you will learn about the CyberArk MDF Program and marketing campaigns to help build your business with CyberArk.

3:50 - 4:20 PM - CyberArk Sales Panel In this session, attendees will learn how to leverage the CyberArk Sales team to accelerate sales opportunities

3:20 PM - 4:20 PM
Partner Technical Track

Level:
Intermediate

Description:
3:20 - 3:50 PM - CyberArk Technical Integrations In this session, we will walk you through the complex security landscape and provide guidance on how to mitigate risk across the enterprise from the edge to the core leveraging key technology integrations.

3:50 - 4:20 PM - CyberArk Blueprint for Partners In this session, attendees will learn about the new CyberArk Blueprint program and how to leverage the program to support successful deployments and support PAM best practices across the enterprise

4:30 PM - 6:00 PM
Exclusive Partner Reception

Description:
Join your CyberArk team and partner collegues for an exclusive reception including cocktails, apps and Partner Awards!

4:30 PM - 4:45 PM
Break
4:45 PM - 6:15 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

4:45 PM - 6:15 PM
CPM Customization for SSH Lab

Level:
Advanced

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

4:45 PM - 6:15 PM
Integrations Lab

Level:
Intermediate

Description:
In this lab, attendees will configure several integrations with the Enterprise Password Vault v10.8 including LDAP, secure SMTP, SNMP, and SIEM.

4:45 PM - 6:15 PM
PVWA/PSM Load Balancing Lab

Level:
Advanced

Description:
In this lab, attendees will create a load balanced environment for their Password Vault Web Access (PVWA) and Privileged Session Manager (PSM) servers.

4:45 PM - 6:15 PM
Training: Managing the Account Lifecycle

Level:
Beginner

Description:
In this session attendees will learn how to use the accounts discovery features of CyberArk and the RestAPI to manage a privileged account throughout its entire lifecycle.

4:45 PM - 6:15 PM
Training: Password Management for New Vault Admins

Level:
Beginner

Description:
In this session attendees will learn the basics of managing a password with Core PAS including creating workflow processes for account retrieval.

6:00 PM - 8:00 PM
Welcome Reception & Discovery Center
7:30 AM - 9:30 AM
Breakfast
8:00 AM - 9:30 AM
Women in Security Breakfast
8:00 AM - 6:00 PM
Certifications

CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/.

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED! Click here to learn more about what is available and to book your slot.

8:00 AM - 9:30 AM
Training: Advanced Troubleshooting and Log Analysis

Level:
Intermediate

Description:
In this session attendees will learn some of the advanced troubleshooting techniques used by CyberArk Support.

8:00 AM - 9:30 AM
Training: PAS Administration for Beginners

Level:
Beginner

Description:
In this session, attendees will get introduced to the various administration tools, configuration files, and log files, that are an essential part of any vault administrators' day-to-day responsibilities.

8:00 AM - 9:30 AM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

8:00 AM - 9:30 AM
PSM Customization for Windows Apps Lab

Level:
Intermediate

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

8:00 AM - 9:30 AM
Zero Trust Just In Time Access Lab

Level:
Intermediate

Description:
In this lab attendees will setup CyberArk Alero and the Ad Hoc Access feature of Core PAS to create a Zero Trust Just In Time Access Solution.

8:00 AM - 9:30 AM
Accounts Discovery Lab

Level:
Beginner

Description:
In this lab, attendees will configure continuous discovery processes, and automatic onboarding rules to reduce unmanaged privileged accounts and access.

8:30 AM - 9:30 AM
Discovery Center
9:30 AM - 12:00 PM
Keynote Sessions
12:00 PM - 2:00 PM
Lunch & Discovery Center
2:00 PM - 2:45 PM
PAM 101: Core Basics of a Successful Privileged Access Management Program

Level:
Non-Technical

Description:
For a successful PAM program, organizations need more than just a tool. They need strategic guidance across people, process, and technology domains from industry experts with years of experience, breach and best practice know how - and - a proven track record of success. Join our CyberArk experts as we review 3 guiding principles that are critical to mitigating risk: prevent credential theft, stop lateral and vertical movement and limit privilege escalation and abuse.

2:00 PM - 2:45 PM
Key - Hash - Signal*

Level:
Beginner

Description:
Metal keys, password hashes and signals based on qbits have a lot in common - they're all prime targets for thieves going for the "crown jewels." The session, presented by Cyberark Labs, will tell the story of different keys and locks, how thieves look to steal them or break them with ease, and how these keys and locks will change in the not too distant future.

2:00 PM - 2:45 PM
Uncovering the True Impact of Digital Transformation with CyberArk*

Level:
Intermediate, Advanced

Description:
Many organizations are already executing on their digital transformation and cloud strategies. During this session, we will highlight how developers can secure both the humans credentials used to access developer tools and cloud admin consoles, as well as the credentials used by applications and other non-human identities. Additionally, we will dive deep into the processes and tools that help your organization manage these challenges.

2:00 PM - 3:30 PM
Training: Defender Exam Prep

Level:
Intermediate

Description:
In this session, attendees will practice for the CyberArk Defender Certification exam by participating in a fun game.

2:00 PM - 3:30 PM
Training: PSM Suite Overview

Level:
Beginner

Description:
In this session, attendees looking to add Privileged Session Manager (PSM) to their CyberArk deployments will learn about the three flavors of PSM, their security benefits, and their effects on user workflows.

2:00 PM - 3:30 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

2:00 PM - 3:30 PM
CPM Customization for SSH Lab

Level:
Advanced

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

2:00 PM - 3:30 PM
RestAPI Lab

Level:
Advanced

Description:
In this lab, attendees will use the CyberArk RestAPI for different use cases

2:00 PM - 3:30 PM
PAS Troubleshooting Challenge

Level:
Advanced

Description:
In this lab, attendees will be given a simple task to perform in a prepared lab environment. However, several configuration issues will occur, and attendees will be challenged to use their troubleshooting skills, as well as their CyberArk support resources to find and resolve all issues and complete the task.

2:45 PM - 3:30 PM
Native Access for Privileged Session Management: UX is King

Level:
Beginner

Description:
A positive end user experience is top priority when trying to implement any security solution. Attend this session to understand all the various flavors of CyberArk's Core Privileged Access Security Solution's session management capabilities. See how CyberArk is enabling users to leverage the tools they're most familiar with, while securing critical infrastructure with CyberArk's industry leading solution.

2:45 PM - 3:30 PM
The World of Credential Theft Malware*

Level:
Beginner

Description:
Welcome to the world of credential theft malware, where attackers can steal your privileged credentials through a wide variety of techniques. The use of malware is one of the most popular and easiest ways attackers steal credentials. Attend this session to gain a better understanding of the different types and strains of credential theft malware, how each type operates and practical methods on how to defend against credential this threat.

2:45 PM - 3:30 PM
CI/CD and Development Environments – The Achilles Heel That Attackers Are Exploiting*

Level:
Intermediate

Description:
With widely used tools such as Jenkins and Ansible becoming Tier 0 assets, it’s no surprise development environments are becoming an increasingly important priority for security teams. In this session you’ll learn how to leverage Application Access Manager and other CyberArk solutions, from Core PAS to innovations such as Secretless Broker and open source, to secure secrets and application credentials. The session will focus on solutions for securing application portfolios, containerized environments, and automation tools. In addition, we will look at the challenges and best practices for working with developers to implement secure best practices across DevOps and other development environments.

3:30 PM - 4:00 PM
Break & Discovery Center
4:00 PM - 4:45 PM
Remote Risk: Best Practices: Securing Remote Vendor Access*

Level:
Beginner

Description:
Remote vendors have authorized access to networks, allowing them to change, alter or impact the operational service of the target organization – this is why they’re so often targeted by attackers. Learn about CyberArk Alero, a new SaaS offering from CyberArk that helps organizations to not only secure, but manage proper access from third parties to critical internal resources. In this session we will be covering recent notable breaches that involve remote vendor access, walk through high and low level architectures, perform a live product demonstration and much more!

4:00 PM - 4:45 PM
A Hole in The Ship: Attacking Kubernetes Cluster*

Level:
Intermediate

Description:
As Kubernetes increases in adoption it is inevitable that more clusters will come under attack to compromise specific applications, or simply to gain access to resources for things such as crypto-coin mining. In this session we will cover number of different attacks on Kubernetes clusters. We will start with a little history on some of the more well known Kubernetes vulnerabilities. We will then highlight how easy it is to perform reconnaissance on Kubernetes, exploit RBAC permissions, as well as cover other different attacks that will compromise the cluster.

4:00 PM - 4:45 PM
CyberArk Privilege Cloud: An Introduction to CyberArk's PAM as-a-Service Solution*

Level:
Intermediate

Description:
As businesses continue to undergo digital transformations, finding security solutions that minimize on-premises infrastructure, reduce time to value and secure critical resources is of the utmost importance. Attend this session as we showcase CyberArk Privilege Cloud, the as-a-Service offering from the #1 leader in Privileged Access Management. We will be covering the back-end architecture, use cases of securing privileged accounts and credentials, as well as the Guided Success Plan; a repeatable 3 step process that you can use to plan, deploy and scale your Privilege Cloud solution.

4:00 PM - 5:30 PM
Training: Sentry Exam Prep

Level:
Intermediate

Description:
In this session, attendees will practice for the CyberArk Sentry Certification exam by participating in a fun game.

4:00 PM - 5:30 PM
Training: PTA Overview

Level:
Beginner

Description:
In this session, attendees that are interested in introducing additional controls to their Privileged Access Security programs, will gain a deeper technical understanding of the Privileged Threat Analytics (PTA). The session will cover use cases to detect, alert, and respond to attacks involving privileged access. The session will also include demos and examples of ways that PTA can protect against irreversible network take overs.

4:00 PM - 5:30 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

4:00 PM - 5:30 PM
PSM Customization for Windows Apps Lab

Level:
Intermediate

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

4:00 PM - 5:30 PM
AAM with Kubernetes \ Open Shift Lab*

Level:
Advanced

Description:
To come

4:00 PM - 5:30 PM
Password Management Lab

Level:
Beginner

Description:
In this lab attendees will setup platform and Master Policy settings to manage a number of differnent types of accounts. Then they will onboard test accounts to ensure password management is working as planned.

4:45 PM - 5:30 PM
Practical Workstation Protection: Best Practices*

Level:
Beginner

Description:
Workstation targeted attacks revolve around privilege, whether they are Windows-based or MacOS ones. As attackers aim for a foothold in your organization, they're looking to steal credentials, manipulate applications, and move laterally across the network. In this session we will best practices for protecting your organization from these advanced attacks, and showcase practical ways to implement the principal of least privilege across all of your Windows and Mac workstations.

4:45 PM - 5:30 PM
Red Team vs Blue Team Live*

Level:
Advanced

Description:
In this live attack and defend series, our Red and Blue teams go head-to-head to show both basic and advanced attacks that gain access to the “crown jewels.” Learn about some of the foundational controls you should be leveraging to develop strong defense and security from a myriad of different attacks.

4:45 PM - 5:30 PM
Renegade Robots: The CISO’s Take on Securing Robotic Process Automation

Level:
Non-Technical

Description:
Robotic Process Automation (RPA) is rapidly being adopted. What could go wrong with a fleet of robots that have high levels of access across multiple sensitive business processes? In this session we will be presenting the key findings and recommendations from industry leading CISOs involved in a research study on securing RPA. Hear how cyber attackers and insiders can attempt to exploit privileged access in RPA systems. Learn how leading organizations are mitigating the risks.

5:30 PM - 7:00 PM
Discovery Center Happy Hour
7:30 PM - 10:30 PM
CyberArk Party
7:00 AM - 9:30 AM
Breakfast
7:30 AM - 9:00 AM
Training: Advanced Troubleshooting and Log Analysis

Level:
Intermediate

Description:
In this session attendees will learn some of the advanced troubleshooting techniques used by CyberArk Support.

7:30 AM - 9:00 AM
Training: Intro to Privileged Access Security

Level:
Beginner

Description:
In this session, attendees will learn the business cases for implementing a privileged access security program.

7:30 AM - 9:00 AM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

7:30 AM - 9:00 AM
CPM Customization for SSH Lab

Level:
Advanced

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

7:30 AM - 9:00 AM
RestAPI Lab

Level:
Advanced

Description:
In this lab, attendees will use the CyberArk RestAPI for different use cases

7:30 AM - 9:00 AM
PAS Fault Tolerance Lab

Level:
Intermediate

Description:
In this lab attendee will setup some of CyberArk's Vault Fault Tolerance features including HA and DR.

10:00 AM - 6:00 PM
Certifications

CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/.

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED! Click here to learn more about what is available and to book your slot.

8:30 AM - 9:30 AM
Discovery Center
9:30 AM - 11:00 AM
Keynote Sessions
11:00 AM - 11:15 AM
Break
11:15 AM - 12:00 PM
Partner Spotlight Sessions
12:00 PM - 1:30 PM
Lunch & Discovery Center
1:30 PM - 2:15 PM
Change Management Considerations for a Successful PAM Project*

Level:
Non-Technical

Description:
In this session we will cover the basics of change management and how this is a key component to every successful PAM project. We'll be discussing how to identify the stakeholder, exchange ideas on how to communicate the changes to the different parties involved, as well as the different proven methods used by current CyberArk customers.

1:30 PM - 2:15 PM
Breaking the Cloud Using Five Different Methods*

Level:
Advanced

Description:
Cloud environments exist everywhere. This in turn means that attackers are super motivated in finding ways to penetrate organizations’ cloud infrastructure. In this session, we will present findings from the CyberArk Labs team, demonstrate five attack techniques, and highlight fundamental considerations such as:
1. How attackers can steal cloud credentials from endpoints, code and cloud VMs
2. How intruders can compromise cloud users with only a few permissions, but still succeed to escalate their permissions and become full admins
3. How to target SSO and IAM solutions that many organizations use for integrating their on-prem network to the cloud

1:30 PM - 2:15 PM
PAM 101: Core Basics of a Successful Privileged Access Management Program

Level:
Non-Technical

Description:
For a successful PAM program, organizations need more than just a tool. They need strategic guidance across people, process, and technology domains from industry experts with years of experience, breach and best practice know how - and - a proven track record of success. Join our CyberArk experts as we review 3 guiding principles that are critical to mitigating risk: prevent credential theft, stop lateral and vertical movement and limit privilege escalation and abuse.

1:30 PM - 3:00 PM
Training: Securing DevOps Applications with AAM

Level:
Intermediate

Description:
In this session, attendees will learn the key features of Conjur and how to implement a base Conjur installation to support secrets management for the DevOps CI/CD tool chain and cloud-native applications.

1:30 PM - 3:00 PM
Training: PTA Overview

Level:
Beginner

Description:
In this session, attendees that are interested in introducing additional controls to their Privileged Access Security programs, will gain a deeper technical understanding of the Privileged Threat Analytics (PTA). The session will cover use cases to detect, alert, and respond to attacks involving privileged access. The session will also include demos and examples of ways that PTA can protect against irreversible network take overs.

1:30 PM - 3:00 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

1:30 PM - 3:00 PM
PSM Customization for Windows Apps Lab

Level:
Intermediate

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

1:30 PM - 3:00 PM
Application Access Manager (AAM) for DevOps Lab

Level:
Intermediate

Description:
In this lab, attendees will gain hands-on experience installing and implementing Conjur to support high-availability and fault tolerance. Additionally, attendees will learn basic administration functions to add and retrieve secrets, as well as how to integrate Conjur with the Enterprise Password Vault.

1:30 PM - 3:00 PM
PAS Troubleshooting Challenge

Level:
Advanced

Description:
In this lab, attendees will be given a simple task to perform in a prepared lab environment. However, several configuration issues will occur, and attendees will be challenged to use their troubleshooting skills, as well as their CyberArk support resources to find and resolve all issues and complete the task.

2:15 PM - 3:00 PM
Cyber Attack Trends Through the Lense of Privileged Access Management*

Level:
Non-Technical

Description:
Join us to dive deep on some of the latest cyber security attack trends, reveal how some of these trends could have been prevented using privileged access management controls, as well as discuss how easy they could have been prevented with a few simple steps.

2:15 PM - 3:00 PM
Temporary Cloud Tokens: How Short Lived Credentials Introduce Massive Risk*

Level:
Advanced

Description:
The rising adoption of cloud environments is causing attackers to keep innovating and finding new ways to abuse the new properties of cloud. In this session, we will present unique research completed by the CyberArk Labs team on how attackers can target these temporary tokens within AWS, and eliminate their temporary characteristics. Attackers can operate in a stealthy way and make it extremely difficult to detect persistence in the compromised cloud environment. Join us for technical demostrations and learn about our new free open source tool that will help you mitigate the risk of this threat.

2:15 PM - 3:00 PM
Native Access for Privileged Session Management: UX is King

Level:
Beginner

Description:
A positive end user experience is top priority when trying to implement any security solution. Attend this session to understand all the various flavors of CyberArk's Core Privileged Access Security Solution's session management capabilities. See how CyberArk is enabling users to leverage the tools they're most familiar with, while securing critical infrastructure with CyberArk's industry leading solution.

3:00 PM - 3:30 PM
Break
3:30 PM - 4:15 PM
Engineering Evolution: Lessons Learned from Implementing Security in SaaS Engineering*

Level:
Advanced

Description:
CyberArk's SaaS Engineering team will shed light on how our engineering has evolved over time, as well as key lessons learned in how we implemented security as part of our SaaS Engineering. In this session we will:
1. Emphasize the importance of integrating security to be applied as code
2. Discuss the provisioning and configuration management of the infrastructure/OS/App as code
3. Show how we "eat our own dog food" and utilize CyberArk in our SaaS operations
4. Highlight our use of Endpoint Privileged Manager to enforce the principle of least privilege

3:30 PM - 4:15 PM
Agile Development: Disciplines You Need to Know from CyberArk*

Level:
Beginner

Description:
As any agile development company, CyberArk's groups are built as autonomous cross-functional units, aimed at fast delivery. On the downside, this means having to face hard times moving forward cross-R&D initiatives or technology changes. Engineers from the same technical discipline in different groups often barely know one another, and have no systematic way of introducing and pursuing such initiatives.

3:30 PM - 5:00 PM
Training: Securing In-House Applications with AAM

Level:
Advanced

Description:
In this session, attendees will learn about the Application Access Manager (AAM) Credential Provider, Central Credential Provider, and Application Security Credential Provider's capabilities to secure credentials used by third-party applications. Attendees will discover several AAM use cases that they can implement to improve their organization's security posture.

3:30 PM - 5:00 PM
Training: Password Management for New Vault Admins

Level:
Beginner

Description:
In this session attendees will learn the basics of managing a password with Core PAS including creating workflow processes for account retrieval.

3:30 PM - 5:00 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

3:30 PM - 5:00 PM
CPM Customization for SSH Lab

Level:
Advanced

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

3:30 PM - 5:00 PM
Application Access Manager (AAM) for In-House Apps Lab

Level:
Advanced

Description:
In this lab, attendees will modify a preexisting Shell script to remove hard-coded credentials using the CyberArk Software Development Kit and Credential Provider.

3:30 PM - 5:00 PM
Password Management Lab

Level:
Beginner

Description:
In this lab attendees will setup platform and Master Policy settings to manage a number of differnent types of accounts. Then they will onboard test accounts to ensure password management is working as planned.

4:15 PM - 5:00 PM
Access Control and Linux: Best Practices for Risk Reduction and Accountability*

Level:
Intermediate

Description:
Extending the principle of least privilege to your Linux distributions is critical in today’s modernized environments. Modern infrastructure and the use of containers has become a practice adopted by most every organization both large and small. Attend this session and learn how to centrally manage and enforce granular access controls and establish superuser accountability, provide a full audit trail and recording of all privileged access activity on all of your Linux systems.

4:15 PM - 5:00 PM
Renegade Robots: The CISO Take on Securing Robotic Process Automation

Level:
Non-Technical

Description:
Robotic Process Automation (RPA) is rapidly being adopted. What could go wrong with a fleet of robots that have high levels of access across multiple sensitive business processes? In this session we will be presenting the key findings and recommendations from industry leading CISOs involved in a research study on securing RPA. Hear how cyber attackers and insiders can attempt to exploit privileged access in RPA systems. Learn how leading organizations are mitigating the risks.

7:00 AM - 9:00 AM
Breakfast
8:00 AM - 4:00 PM
Certifications

CyberArk certification is designed for various roles and levels of experience, each introducing progressively more advanced and challenging material and exams. You can work up to the level the best aligns with your responsibilities and career ambitions. The CyberArk certification validates your expertise and opens up further professional opportunities. For more details on the CyberArk Certification programs, please visit https://training.cyberark.com/.

Certification testing will be provided throughout Impact and ALL FEES ARE WAIVED! Click here to learn more about what is available and to book your slot.

8:00 AM - 9:30 AM
Training: Advanced Troubleshooting and Log Analysis

Level:
Intermediate

Description:
In this session attendees will learn some of the advanced troubleshooting techniques used by CyberArk Support.

8:00 AM - 9:30 AM
Training: Intro to Privileged Access Security

Level:
Beginner

Description:
In this session, attendees will learn the business cases for implementing a privileged access security program.

8:00 AM - 9:30 AM
Training: Enforcing Least Privilege with OPM

Level:
Intermediate

Description:
In this session, attendees will learn how to use CyberArk's On-Demand Privilege Manager (OPM) to enforce Least Privileged Principles on Unix and Linux servers.

8:00 AM - 9:30 AM
Training: Managing the Account Lifecycle

Level:
Beginner

Description:
In this session attendees will learn how to use the accounts discovery features of CyberArk and the RestAPI to manage a privileged account throughout its entire lifecycle.

8:00 AM - 9:30 AM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

8:00 AM - 9:30 AM
PSM Customization for Windows Apps Lab

Level:
Intermediate

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

8:00 AM - 9:30 AM
Application Access Manager (AAM) for DevOps Lab

Level:
Intermediate

Description:
In this lab, attendees will gain hands-on experience installing and implementing Conjur to support high-availability and fault tolerance. Additionally, attendees will learn basic administration functions to add and retrieve secrets, as well as how to integrate Conjur with the Enterprise Password Vault.

8:00 AM - 9:30 AM
PAS Fault Tolerance Lab

Level:
Intermediate

Description:
In this lab attendee will setup some of CyberArk's Vault Fault Tolerance features including HA and DR.

9:30 AM - 9:45 AM
Break
9:45 AM - 11:15 AM
Training: Fault Tolerant Architectures

Level:
Beginner

Description:
In this session, attendees will learn about the various fault tolerance options for the Privileged Access Security architecture.

9:45 AM - 11:15 AM
Training: PAS Administration for Beginners

Level:
Beginner

Description:
In this session, attendees will get introduced to the various administration tools, configuration files, and log files, that are an essential part of any vault administrators' day-to-day responsibilities.

9:45 AM - 11:15 AM
Training: Enforcing Least Privilege with EPM

Level:
Beginner

Description:
In this session, attendees will learn about several use cases of Endpoint Privilege Manager (EPM), including least privilege enforcement, credential theft protection, and application control. Students will learn to analyze the contents of the Inbox and decide on an appropriate policy for application discovered in their environment

9:45 AM - 11:15 AM
Training: Configuring Just In Time Access

Level:
Beginner

Description:
In this session attendee will learn about using the Ad Hoc Access Features of Core PAS to create Just In Time access for Administrators.

9:45 AM - 11:15 AM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

9:45 AM - 11:15 AM
CPM Customization for SSH Lab

Level:
Advanced

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

9:45 AM - 11:15 AM
Application Access Manager (AAM) for In-House Apps Lab

Level:
Advanced

Description:
In this lab, attendees will modify a preexisting Shell script to remove hard-coded credentials using the CyberArk Software Development Kit and Credential Provider.

9:45 AM - 11:15 AM
PVWA/PSM Load Balancing Lab

Level:
Advanced

Description:
In this lab, attendees will create a load balanced environment for their Password Vault Web Access (PVWA) and Privileged Session Manager (PSM) servers.

11:15 AM - 11:30 AM
Break
11:30 AM - 1:00 PM
Training: Securing DevOps Applications with AAM

Level:
Intermediate

Description:
In this session, attendees will learn the key features of Conjur and how to implement a base Conjur installation to support secrets management for the DevOps CI/CD tool chain and cloud-native applications.

11:30 AM - 1:00 PM
Training: PSM Suite Overview

Level:
Beginner

Description:
In this session, attendees looking to add Privileged Session Manager (PSM) to their CyberArk deployments will learn about the three flavors of PSM, their security benefits, and their effects on user workflows.

11:30 AM - 1:00 PM
Training: Preventing Ransomware and Credential Theft with EPM

Level:
Intermediate

Description:
In this session, attendees will learn how to use Endpoint Privilege Manager (EPM) to protect against credential theft, ransomware and additional advanced protections like restricting application access. The session will cover, among other things, how EPM can be leveraged to prevent file-less malware attacks that use PowerShell to access the internet.

11:30 AM - 1:00 PM
Training: Getting Started with Rest API

Level:
Intermediate

Description:
To come.

11:30 AM - 1:00 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

11:30 AM - 1:00 PM
PSM Customization for Windows Apps Lab

Level:
Intermediate

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

11:30 AM - 1:00 PM
RestAPI Lab

Level:
Advanced

Description:
In this lab, attendees will use the CyberArk RestAPI for different use cases

11:30 AM - 1:00 PM
Accounts Discovery Lab

Level:
Beginner

Description:
In this lab, attendees will configure continuous discovery processes, and automatic onboarding rules to reduce unmanaged privileged accounts and access.

1:00 PM - 2:00 PM
Lunch
2:00 PM - 3:30 PM
Training: Securing In-House Applications with AAM

Level:
Advanced

Description:
In this session, attendees will learn about the Application Access Manager (AAM) Credential Provider, Central Credential Provider, and Application Security Credential Provider's capabilities to secure credentials used by third-party applications. Attendees will discover several AAM use cases that they can implement to improve their organization's security posture.

2:00 PM - 3:30 PM
Training: PTA Overview

Level:
Beginner

Description:
In this session, attendees that are interested in introducing additional controls to their Privileged Access Security programs, will gain a deeper technical understanding of the Privileged Threat Analytics (PTA). The session will cover use cases to detect, alert, and respond to attacks involving privileged access. The session will also include demos and examples of ways that PTA can protect against irreversible network take overs.

2:00 PM - 3:30 PM
Training: Configuring Just In Time Access

Level:
Beginner

Description:
In this session attendee will learn about using the Ad Hoc Access Features of Core PAS to create Just In Time access for Administrators.

2:00 PM - 3:30 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

2:00 PM - 3:30 PM
CPM Customization for SSH Lab

Level:
Advanced

Description:
In this lab, attendees looking to extend the capabilities of the Central Policy Manager (CPM) will use the new Plugin Generation Utility (PGU) to create a platform for a Solace network device.

2:00 PM - 3:30 PM
Integrations Lab

Level:
Intermediate

Description:
In this lab, attendees will configure several integrations with the Enterprise Password Vault v10.8 including LDAP, secure SMTP, SNMP, and SIEM.

2:00 PM - 3:30 PM
PAS Troubleshooting Challenge

Level:
Advanced

Description:
In this lab, attendees will be given a simple task to perform in a prepared lab environment. However, several configuration issues will occur, and attendees will be challenged to use their troubleshooting skills, as well as their CyberArk support resources to find and resolve all issues and complete the task.

3:30 PM - 3:45 PM
Break
3:45 PM - 5:15 PM
Training: Managing the Account Lifecycle

Level:
Beginner

Description:
In this session attendees will learn how to use the accounts discovery features of CyberArk and the RestAPI to manage a privileged account throughout its entire lifecycle.

3:45 PM - 5:15 PM
Training: Password Management for New Vault Admins

Level:
Beginner

Description:
In this session attendees will learn the basics of managing a password with Core PAS including creating workflow processes for account retrieval.

3:45 PM - 5:15 PM
Training: Fault Tolerant Architectures

Level:
Beginner

Description:
In this session, attendees will learn about the various fault tolerance options for the Privileged Access Security architecture.

3:45 PM - 5:15 PM
Training: Getting Started with the RestAPI

Level:
Intermediate

Description:
To come.

3:45 PM - 5:15 PM
CPM/PSM Customization for WebApps Lab

Level:
Advanced

Description:
In this lab, attendees who are looking to extend the capabilities of Privileged Session Manager (PSM) and the Central Policy Manager (CPM), will use the new WebApp framework to develop custom PSM Connection Components and CPM Plugins for web applications. This lab also includes the new Plugin Generator Utility (PGU) for recording PSM Connection Components for web applications.

3:45 PM - 5:15 PM
PSM Customization for Windows Apps Lab

Level:
Intermediate

Description:
In this lab, attendees will develop custom PSM connection components for desktop applications. Namely, attendees will develop a custom connection component for an FTP client (FileZilla), using two methods: Command Line based connection component and Universal Connector (i.e., AutoIt).

3:45 PM - 5:15 PM
Zero Trust Just In Time Access Lab

Level:
Intermediate

Description:
In this lab attendees will setup CyberArk Alero and the Ad Hoc Access feature of Core PAS to create a Zero Trust Just In Time Access Solution.

3:45 PM - 5:15 PM
Password Management Lab

Level:
Beginner

Description:
In this lab attendees will setup platform and Master Policy settings to manage a number of differnent types of accounts. Then they will onboard test accounts to ensure password management is working as planned.

Search