<img src="https://certify.alexametrics.com/atrk.gif?account=Zpb+p1uhUo20dG" style="display:none" height="1" width="1" alt="">
Panel Discussion: 3 Ways to Strengthen RPA security with PAM

Webinar

Think About Your Audience Before Choosing a Webinar Title


Sponsored by BEYONDTRUST 


Tuesday, June 22, 2021
3 p.m. ET

Organizations are challenged to automate more and more processes as they embark on digital transformation projects. This acceleration in the deployment of automation is also introducing new security risks and expanding the attack surface. How can RPA tools manage identity and authentication models, privileges, reused passwords, and credentials? These are exactly the assets cybercriminals want to acquire.

Join this upcoming webinar with 3 security and application experts, Charles Kolodgy, Mitchell Ashley, and Jason Jones who will examine how to bolster RPA security, how critical secrets within RPA apps can be protected, security challenges with RPA, and potential solutions. Our experts will also cover how API access tokens, credentials, certificates, and cryptographic keys are embedded within applications and potential pitfalls associated with application identity and authorization. Learn how BeyondTrust can help discover, manage, audit, and monitor privileged accounts to enable a secure approach for your RPA strategy.

Attendees can also expect to learn:

  • How to address overlapping and sometimes conflicting needs between RPA, Identity, and Security
  • How best to balance securing and managing secrets used by apps against application delivery schedules
  • How Privileged Access Management (PAM) and RPA can accelerate your digital transformation projects
Jason Jones
Senior Product Manager - BeyondTrust
Jason has been building business applications and software products going on 15 years. With a background in Development, QA, Product Management, and wearing as many hats as possible at a medical startup, he has extensive experience with the entire product lifecycle. Jason has been working on BeyondTrust products for the past 7 years and has a primary focus on our Privileged Password and Session Management solutions.
Mitch Ashley
CEO - Accelerated Strategies Group
Mitchell Ashley is a renowned strategist and technology executive. Mitchell has led successful IT, SaaS, and cybersecurity transformations. He’s led multiple teams in developing and bringing to market successful online services, cybersecurity, and networking products and services.
Mitch serves as CEO & Managing Analyst of Accelerated Strategies Group where he leads a team of preeminent experts in digital transformation, DevOps, cloud-native, and cybersecurity. In this role, Mitch works with companies to align digital transformation and technology strategies to achieve disruptive goals and high impact results. Mitch is in high demand as a speaker at conferences the world over, and his popular DevOps Chats podcast engaging with digital leaders is one of the most widely followed in the field.
CHARLES KOLODGY
Analyst - Accelerated Strategies Group
Charles J. Kolodgy is a security strategist, visionary, forecaster, historian, educator, and advisor who has been involved in the cyber security field for over 25 years. He is an Analyst with Accelerated Strategies Group and Principal at Security Mindsets. His views and understanding of information and computer security were shaped during his years at the National Security Agency. During that time he held a variety of analyst and managerial positions within both the information assurance and operations directorates. Following NSA is was a a Research Vice President covering security markets for IDC and then a Senior Security Strategist for IBM Security. Over the years he has identified market trends and authored numerous documents to explain market realities and has been a speaker at many security conferences and events, including the RSA Conference, CIO Conference, CEIG, and IANS. He has been widely quoted in the media. He is best known for naming and defining the Unified Threat Management (UTM) market which continues to be one of the strongest cyber security markets with vendor revenue of $3 billion per year. He has been a leading analyst on software security, encryption, and the human element.
 

On-Demand Viewing:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.