About the event
We are pleased to invite you to Boston, July 16th – 18th for our 12th Annual Americas CyberArk Impact.
This year’s conference will be one of the most engaging and valuable events in cyber security and includes training,
thought leadership sessions and countless networking opportunities.
We look forward to seeing you in Boston!
Venue
CyberArk Impact 2018 will be held at the Seaport Boston Hotel & World Trade Center.
CyberArk has secured hotel rooms nearby that can be booked during the registration process.
Be sure to make your reservations early to ensure availability and get the special CyberArk group rate!
Seaport Boston Hotel & World Trade Center
200 Seaport Blvd, Boston, MA 02210
Tel. 617-385-4000
Nightly Hotel Rate: $299++
Aloft Boston Seaport
401-403 D Street, Boston, MA, 02210
Tel. 617-530-1600
Nightly Hotel Rate: $319++
Hilton Boston Logan Airport
1 Hotel Dr, Boston, MA, 02210
Tel. 617-568-6700
Nightly Hotel Rate: $265++
Agenda
Monday, July 16th | |||||||
Time | Lab 1 | Lab 2 | Lab 3 | Session 1 | Session 2 | Session 3 | Session 4 |
---|---|---|---|---|---|---|---|
7:30am - 8:30am | Registration & Continental Breakfast | ||||||
8:30am - 10:00am | EPM Policies Lab | PSM Custom Connection Components Lab 1A |
PSM Custom Connection Components Lab 1B |
Core PAS for New Vault Admins |
DevOps 101 | Intro to PTA | Intro to Least Privilege *NIX Management with OPM |
10:00am - 10:15am | Break | Break | |||||
10:15am - 11:45am | PSM Custom Connection Components Lab 2A |
Plugin Generation Utility Lab 1 |
PSM Custom Connection Components Lab 2B |
Intro to Conjur for Security Teams |
Intro to PSM | Setting up Policies with EPM |
|
11:45am - 12:45pm | Lunch | ||||||
12:45pm - 2:15pm | Conjur Lab for Security Admins 1 |
PSM Custom Connection Components Lab 3 |
Plugin Generation Utility Lab 2 |
PAS Troubleshooting | Intro to PTA | Intro to CyberArk Discovery & Audit (DNA) |
Credential Theft and Ransomware Protection with EPM |
2:15pm - 2:30pm | Break | ||||||
2:30pm - 4:00pm | Auto Discovery Lab | Plugin Generation Utility Lab 3 |
Conjur Lab for Security Admins 2 |
What's New in V10 | Intro to AIM | Intro to Accounts Discovery |
EPM Troubleshooting |
4:00pm - 4:15pm | Break | ||||||
4:15pm - 5:45pm | Core PAS Troubleshooting Lab (PVWA & CPM) 1 |
Core PAS Troubleshooting Lab (PVWA & CPM) 2 |
PSM Custom Connection Components Lab 4 |
Introduction to PAS Hygiene Program |
Intro to PSM | Privileged Session Manager Proxy |
|
7:00pm - 10:00pm | Welcome Reception | ||||||
Tuesday, July 17th | |||||||
Time | Session 1 | Session 2 | Session 3 | Session 4 | Session 5 | ||
7:30am | Registration Opens | ||||||
7:30am - 8:30am | Breakfast & Partner Pavilion | ||||||
8:30am - 8:45am | GENERAL SESSION: CyberArk Welcome | ||||||
8:45am - 9:15am | GENERAL SESSION: Leading Security into the Future- Udi Mokady, Founder, Chairman & CEO | ||||||
9:15am - 10:00am | GENERAL SESSION: Staying One Step Ahead: CyberArk Vision and Roadmap- Roy Adar, SVP Product Management | ||||||
10:00am - 10:30am | Coffee Break & Partner Pavilion | ||||||
10:30am - 11:15pm | GENERAL SESSION: Cloak & Dagger: Red Team Unveiled- Shay Nahari, Head of Red Team Services | ||||||
11:15am - 11:45pm | GENERAL SESSION: Malware, Cryptocurrency Mining and More: Lessons Learned from Recent Attacks- Shaked Rainer, Research Squad Leader | ||||||
11:45pm - 1:15pm | Lunch with Discovery Center & Partner Pavilion | ||||||
1:15pm - 2:00pm | Attack Methodology: Assume Breach - Access and Escalation in Windows |
Attack Methodology: Preventing Attacks Against Your AWS Castle in the Sky |
Defense Strategy: How to Handle “Office Space” Moments and Move Forward With Your PAS Program |
Defense Strategy: When Less is More Least Privilege for Your Windows Servers and Endpoints |
Product & Technology: EPV & PSM Best Practices |
||
2:00pm - 2:30pm | Coffee Break & Partner Pavilion | ||||||
2:30pm - 3:15pm | Attack Methodology: Deep Dive on Kerberoasting and Other Kerberos Attacks |
Attack Methodology: How to Stop Endpoints From Being Your Weakest Link |
Defense Strategy: Securing Active Directory with Red Forest: Yes, No, or Maybe? |
Defense Strategy: Vaultive- Securing your Privileged Cloud Applications with CyberArk |
Product & Technology: Best Practices for Securing your AWS, Azure, and GCP Environments |
||
3:15pm - 3:45pm | GENERAL SESSION: Introducing the CyberArk Marketplace & C3 Alliance Update- Adam Bosnian, EVP Global Business Development | ||||||
3:45pm - 4:30pm | GENERAL SESSION: Security is a Team Game- Partner Panel with SailPoint, OKTA and ForeScout | ||||||
4:30pm - 6:30pm | Discovery Center & Partner Pavilion Happy Hour | ||||||
7:00pm - 10:00pm | CyberArk Evening Event @ Lawn on D | ||||||
![]() ![]() ![]() |
|||||||
Wednesday, July 18th | |||||||
Time | Session 1 | Session 2 | Session 3 | Session 4 | Session 5 | ||
8:00am - 9:00am | Breakfast & Partner Pavilion | ||||||
9:00am - 10:00am | GENERAL SESSION: Keynote Speaker- Stealing Your Life: Identity Theft- Frank Abagnale | ||||||
10:00am - 10:30am | GENERAL SESSION: DevOps Keynotes- Bridging the Gap Between Security & DevOps- Karen Eldor, VP Product Management & Elizabeth Lawler, VP DevOps Security | ||||||
10:30am - 11:00am | Coffee Break & Partner Pavilion | ||||||
11:00am - 11:30am | Partner Spotlight Session- Optiv | Partner Spotlight Session- PwC | Partner Spotlight Session- CyberSheath | ||||
11:30am - 12:15pm | Attack Methodology: Preventing Attacks Against Your AWS Castle in the Sky |
Defense Strategy: Got Robots? How to Secure Privilege in Robotic Process Automation Environments |
Defense Strategy: DevOps Session The Butler and the Wizard: Securing Secrets Used By Jenkins |
Product & Technology: More Zbang for the Zbuck: How Zbang Can Be Used to Discover Hidden Risks |
Partner Breakout Session- Cognizant | ||
12:15pm - 1:00pm | Attack Methodology: *NIX The Not-So-New Frontier |
Attack Methodology: DevOps Session Hacking Containers |
Defense Strategy: To the Cloud and Beyond |
Product & Technology: Are you Ready for GDPR? |
Product & Technology: EPV & PSM Best Practices |
||
1:00pm - 1:15pm | GENERAL SESSION: Closing | ||||||
1:15pm | Lunch & Partner Pavilion | ||||||
![]() ![]() ![]() |
FAQs
-
WHEN AND WHERE IS CYBERARK IMPACT 2018?
CyberArk Impact 2018 will be held at the Seaport Boston Hotel & World Trade Center. Optional training begins at 8 AM Monday, July 16th and runs throughout the day followed by a welcome reception for all conference attendees that evening at 7 PM. Keynote sessions kick off at 9 AM on Tuesday, July 17th and the conference closes at 2 PM on Wednesday, July 18th.
-
HOW DO I GET TO THE EVENT FROM THE AIRPORT?
Taxi:
The Seaport Hotel is about 3 miles from Boston Logan Airport (appx. 10 minutes with no traffic). Taxis are readily available from the airport and the lobby of the Seaport.
Public Transportation:
The MBTA Silver Line Waterfront (SL1) provides service from the World Trade Center Station to and from Logan International Airport terminals every 10 minutes during the weekday and every 15 minutes during the weekend. The Silver Line station (World Trade Center) is located adjacent to the hotel.
-
WHAT IS THE COST TO ATTEND?
The conference is free for all CyberArk customers and partners will be charged $495 to attend. CyberArk will cover all meals that are listed on the event agenda. Hotel stay, air travel, transportation between hotel and airport, as well as any other incidental expenses are the responsibility of the attendee.
-
WHAT IS THE NIGHTLY HOTEL ROOM RATE?
The nightly room rate varies based on the hotel you’ve selected and/or what is available. All room reservations must be made with CyberArk through the event registration system to guarantee the negotiated rates.
Seaport Hotel: $299 ++ per night
Yotel Boston: $269++ per night
Aloft Boston Seaport: $319++ per night
Hilton Boston Logan Airport: $265++ per night -
WHAT IF I NEED TO CANCEL MY HOTEL?
Hotel rooms can be cancelled without penalty until Wednesday, June 6th. After that time, you will be charged the first night of your stay.
-
CAN I STAY ADDITIONAL NIGHTS OUTSIDE OF THE EVENT DATES?
Yes. To book additional nights outside of the July 15th – July 18th dates, please do so during the registration process. This rate is available based on hotel occupancy, and is not guaranteed, so we recommend you book early.
-
HOW DO I REGISTER?
Register online by clicking here and follow the on-screen instructions to complete the process. You will receive a confirmation email once you complete the registration.
-
HOW MANY PEOPLE IS MY ORGANIZATION ALLOWED TO SEND?
Each company is allowed to send a maximum of 4 attendees to the event.
-
CAN MY FAMILY / FRIENDS JOIN THE CONFERENCE AND/OR EVENING EVENTS?
Unfortunately not, this is a business event and is not designed for guests.
-
I AM UNABLE TO ATTEND IMPACT. CAN I INVITE A COLLEAGUE?
Yes, please forward your colleague the registration email you have received from CyberArk. Please remember each customer is allowed to send a maximum of 4 attendees.
-
WHAT IS THE DRESS CODE FOR THE EVENT
The dress code for the conference is business casual. The dress code for evening events is casual.
-
CAN I REGISTER ON-SITE?
No – you must register before arriving on-site. Registration will close on Thursday, July 12th.
-
DO THE TRAINING SESSIONS COUNT FOR CPE CREDITS?
Yes. Attendees must handle their own submission for CPE credits directly to ISC2. 16 credits is maximum amount that can be obtained from attending Impact 2018.
-
I HAVE ADDITIONAL QUESTIONS ABOUT THE EVENT. WHO SHOULD I CONTACT?
Please email events@cyberark.com.
Speakers

Udi Mokady is the Chairman and CEO of CyberArk, and a pioneer in establishing the Privileged Account Security software market. Since co-founding the company in 1999, Mokady has entrenched CyberArk as the market leader in privileged account security and compliance. During his tenure at CyberArk, Mokady has also served as CyberArk’s chief strategist and visionary, overseeing global expansion, management, execution and corporate development.

Shay Nahari is the Head of Red-Team services in CyberArk and brings more than 15 years of experience in cyber security and telecommunications. He specializes in working with global organizations to improve their ability to detect and react to targeted attacks using adversary simulation and advanced real life tactics, techniques and procedures (TTP).

Roy Adar is the Senior Vice President of Product Management at CyberArk. In his role he is responsible for CyberArk’s product management, product marketing and overall product strategy.

Adam Bosnian is the Executive Vice President of Global Business Development at CyberArk. He is responsible for managing and expanding global strategic relationships with technology partners at CyberArk.
Sponsors

TERMS & CONDITIONS
CyberArk 2018 Impact Event
CyberArk’s Policy
CyberArk’s policy is to comply with all applicable anti-corruption laws and regulations in all countries in which we do business, and we believe that this event and the hospitality offered by us as part of it are reasonable and appropriate as part of our business relationship. We also acknowledge that our customers and partners may have similar policies or corporate code of ethics.
Event Terms & Conditions
As the organizer, we will manage the event in good faith and in conformance with industry standards. CyberArk makes no other representations or warranties regarding the event. We reserve the right to change the agenda without prior notice, and will not be liable for any claims, damages, losses, expenses, costs or liabilities whatsoever (“Damages”) arising out of or in connection with the cancelation or rescheduling of the event for any reason. These terms and conditions are to be governed by, construed, interpreted and enforced in accordance with the laws of the Republic of Singapore (without giving reference to choice‑of‑law provisions). If a dispute arises out of or relates to this Agreement or a breach thereof, and if said dispute cannot be settled through direct discussions, said dispute will be settled exclusively by the state courts of Singapore. Under no circumstances will CyberArk or anyone acting on its behalf be liable in any way for any damages arising from any case of force majeure or other causes beyond its reasonable control. To the extent permitted by applicable law, in no event will CyberArk or anyone acting on its behalf be liable for damages arising out of or in connection with the event in an amount exceeding USD 1,000 per participant, nor for any indirect, special, incidental, consequential or punitive damages however caused, whether in contract, tort or under any other theory of liability, and whether or not any such person or entity has been advised of the possibility of such damages.