×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Balancing Zero Trust and Operational Expediency for Army

July 9, 2020


Optiv and CyberArk, as security leaders within the DOD, have found there are significant challenges with securing privileged accounts and isolating associated activity within the Army. We have assembled key thought leaders to discuss how to enable zero trust architecture while still facilitating operational expediency for an Army specific webinar. 

Topics include:

  • Protecting privileged accounts and privileged machine identities 
  • Asserting multifactor for non-compliant devices and applications. 
  • Compliance with the RMF framework
  • Automate the management of service account password rotation within STIG requirements
     
Previous Video
5 Privileged Access Management (PAM) Use Cases Explained
5 Privileged Access Management (PAM) Use Cases Explained

In case of a cyberattack, privileged credentials can be used to cause catastrophic damage to a business. Jo...

Next Video
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale

Joint webinar with Red Hat shows how to simplify and enhance the security of OpenShift using CyberArk’s sec...