SlideShare a Scribd company logo
4/3/2024
Efficiencies with UiPath and CyberArk
The UiPath word mark, logos, and robots are registered trademarks owned by UiPath, Inc. and its affiliates. ©2023 UiPath. All rights reserved.
Diana Gray
Senior Community Marketing
Manger, AMER @UiPath
Meet the Team
Brian Carpenter
Joshua Gregory
Jeremy Patton
Stuart McEntee
Polo Perez
Sales Engineer @UiPath, Inc.
Senior Presales Technical
Consultant @UiPath, Inc.
Solutions Engineer – DevOps
@ CyberArk
Sales – Secrets Manager
Sales Specialist @ CyberArk
Senior Director of Business
Development @ CyberArk
About today’s meeting:
• Welcome to the UiPath and CyberArk Webinar Sessions
• We will be recording these sessions, so please keep yourself on mute unless
the speaker ask if you have any questions.
• The recording will be available tomorrow and I will put the url in chat, where
you can find it under the wrap up tab at the top of the page.
• You are encouraged to put any questions that you have in chat
• These sessions are designed for you to engage with us on topics that interest
you, so please let us know your thoughts and feel free to share your
experiences during the Q&A session.
• If you have any additional topics that you want us to cover, please email me @
diana.gray@uipath.com
Agenda
• Value of Leveraging CyberArk with UiPath, recap
• Efficiencies with UiPath and CyberArk
• Barriers to Automation
• Eliminating Manual Activities
• Benefits of Centralized Credential Storage
• Data Handling Best Practices for Bots
• Bot Oversight
• Secrets Manager

Recommended for you

Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications

Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).

saas development frameworksaas reusable componentsaas best practices
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward

This document discusses shadow IT and provides recommendations for how enterprise IT can embrace it. It defines shadow IT as solutions developed without enterprise IT oversight and explains why teams turn to it for freedom, ownership, and ego. Trends like externalization, consumerization, and democratization of technology are driving its growth. The document recommends that enterprise IT address barriers preventing shadow IT from adopting standards, extend solutions to shadow IT teams, and merge policies with their environments to bridge the divide between the two.

enterprise architectureshadow it
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications

This document discusses security best practices for Software as a Service (SaaS) applications. It recommends adopting a holistic governance framework to manage operational risks, using standards like COBIT 5. Key aspects covered include tenant data isolation, role-based access control, preventing common web attacks, and implementing robust security auditing of events, transactions, and user actions. The goal is to establish trust with customers by providing protection of information, access controls, data security, and audit capabilities.

securityarchitecturesaas applications
• Left unmanaged and unprotected, privileged
credentials can transform RPA into a backdoor for bad
actors to access corporate IT infrastructure
• Bad actors can access same systems, applications
and data as software robots using acquired privileged
credentials
• Login process appears genuine, making detection of
suspicious activity unlikely
• Bad actors can manipulate, compromise and exfiltrate
confidential or commercially sensitive information
• Bad actors tend to make lateral moves to other
systems and applications, further penetrating an
organization's infrastructure
• Compromised privileged credentials can lead to
financial losses, reputational damage and diminished
customer loyalty
Allow security and development teams to
dynamically manage the applications’
secrets required to access resources and
services across hybrid and multi-cloud
environments without impacting agility.
Privileged credentials are often called “SECRETS” and refer to a private piece of information that
acts as a key to unlock protected resources or sensitive information in tools, databases,
applications, containers, DevOps and cloud-native environments.
SECRETS MANAGER GOAL
6
Human Access
Non-Human
Access
1 person
45 apps/tools
workloads
service accounts
Cloud- Hybrid Cloud
Data Center
Kubernetes
RPA CI/CD
Scripts Containers
Vulnerability Scanner
Home grown apps
SolarWinds
Octopus
Codecov
Uber
Stuart McEntee, CISSP
CyberArk Secrets Manager Specialist
stuart.mcentee@cyberark.com
www.cyberark.com
SEC Ruling:
https://www.sec.gov/news/press-release/2023-139
7
Key
Benefits
Developers
Simplicity: Native
integrations simplify
securing DevOps tools,
CI/CD, ISV to zOS and
everything in between.
Security
Robust Security:
Centralized management,
rotation, audit and strong
authentication ensures
workloads securely access
to secrets.
Operations
Efficiency &
Availability: Architected
to ensure secrets are
always available when
and where they are
needed.
Secrets
Hub
…Not a single product or one-time event
J2EE App Server DS CP
8
CP
Application
Script
SDK
CLI
Credential Provider(s)
Varonis, Venafi, ForeScout,, Broadcom, HPE, Ping
Identity, Rapid7, SailPoint, ServiceNow, Splunk,
Symantec, Scripts
Application Server
, Provider(s)
Apache Tomcat, IBM WebSphere, Oracle WebLogic,
Red Hat JBoss
Conjur Enterprise
Ansible*, AWS, Azure, CloudBees, Docker, Entrust HSM, GitLab, Kubernetes,
OpenShift, Puppet, Terraform, VMWare Tanzu
AWS Secrets Manager
Azure Key Vault
(Google future)
Secrets Hub
Application
Script
Rest
Rest
Central Credential Provider(s)
Chef, Datamatics, IBM Urbancode, Jenkins, LogicMonitor, Palo Alto Networks,
Qualys, PKWare, Tenable, UiPath*
443
CP
Agent-Based Agentless
SaaS
Priv Cloud
Conjur Cloud
1858
SECRETS MANAGEMENT IS A CROSS-DOMAIN, HYBRID STRATEGY & PROGRAM

Recommended for you

Enhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace SolutionsEnhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace Solutions

TAKE BACK YOUR DATA: Past week, it has been very inspirational to deep dive into the topic of digital workspace and during our recent event here in KLCC, we presented a customized angle for Digital Workplace for contact center operators and providers. Our objective was to embrace new working methods, ensure highest level of security and privacy within contact centers. We have seen sufficiently how contact centers can sometimes become the springboard to data privacy issues and operators can consider these tools to ensure everything that belongs to you, stays tangibly with you! #trust #takebackyourdata

opensourceonlyofficeapache guacamole
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...

Stratégie, risques liés à l'adoption de l'open source... Comment un modèle de gouvernance fort peut rendre votre parcours open source le plus efficace.

open sourcelogiciel libregouvernance
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?

Your organisation’s data are now everywhere: on your servers and your desktop PCs; on your employees’ smart phones, tablet computers and laptops; on social networks; and in public clouds. Some of these data require special protection but they also need to be accessed remotely, which makes security a considerable challenge. Can you trust public clouds to keep your data safe and secure? Can you trust your own internal systems? And on what criteria and risk management strategies should you base your trust? -- Dr Mark Ian Williams's presentation at the April 2012 'Why Cloud? Why now?' conference at the headquarters of the Institute of Chartered of Accountants of England Wales.

cloud securitycloud computing
9
MOST COMPLETE &
EXTENSIBLE IDENTITY
SECURITY PLATFORM
BROADEST INTEGRATION
SUPPORT
IDENTITY SECURITY
INNOVATOR
PROVEN EXPERTISE IN
SECURING IDENTITY
• Manages secrets for apps,
automation scripts, non-human
identities AND human users
• Centralized secrets management
• 200+ integrations with top DevOps
tools, platforms and COTS apps
• Work with partners and open-source
communities to certify and expand
• Secrets rotation with zero downtime
• Zero /minimal code changes for
devs, e.g., ASCP, Secretless
• Data segregation with centralized
management
• Entire company focused on security
• Expert in partnering with security
teams
• Trusted by over half Fortune 500
ARCHITECTED FOR THE
MODERN ENTERPRISE
• High availability architecture
• High performance & scale -
unique read-only follower
architecture
• Innovative solutions for securing
mission critical legacy apps
SECRETS MANAGER
ALIGNMENT TO
CYBERARK
DIFFERENTIATORS
10
Credential
Management
Now we highlighted the importance
of bot identities, it’s mandatory to
periodically check and maintain
all accounts’ permissions
and configurations
Credential manager
All accounts should be stored in a common credential manager that allows each team
member to access required dev/prod accounts based on their team role
(dev, support, business analysts)
Periodically change account passwords to enhance
security and compliance guidelines
Regularly rotating account passwords limits risks of sharing or leaking
Some processes might have been decommissioned
and the associated account is no longer required
This can be easily tracked with an Internal Process Inventory that contains real-time
production processes information like name, deployment location, accounts used etc.
11
Add a credential store
Natively link
your CyberArk
store with
UiPath
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2

Recommended for you

Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service

Simeio Solutions provides a comprehensive suite of identity and access management (IAM) services including managed services and deployment of ForgeRock products in cloud, hosted, or on-premise environments. Their Business-Ready IAM Cloud manages over 10 million identities. Case studies show how they helped customers consolidate IAM systems, enable single sign-on for distributed users, and simplify IAM through expert managed services when customers downsized their security teams.

identitysimeioois
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation

Travis Cox from Inductive Automation explains how to reduce human error in GMP by automating data capture from PLCs and devices on your plant floor, consolidating it, and feeding it into centralized analytics & reporting for profound business intelligence.

safetychain softwaregmp manufacturinginductive automation
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQ

Presentation from September 2014 at LinkedIn Headquarters in Mountain View. The slides detail how LinkedIn is transforming their business with tools from Atlassian Software. ServiceRocket is Atlassian's first and longest-serving Platinum Expert Partner.

enterprise 2.0enterprise softwareatlassian software
Efficiencies with UiPath and CyberArk
• UiPath and CyberArk together
improves efficiency
• Combines RPA with privileged
access management
Cost Savings
• Software robots process tasks faster than
humans resulting in cost savings
• RPA can help organizations take
advantage of early payment discounts
• Working at a faster pace enables
additional process-specific savings
Scalability and Efficiency
• Robots work around the clock, and RPA
processes can be scaled easily across
countries and business units
• Software robots carry out tasks faster and
at a steady rate for as long as required
• Robots could help organizations speed up
the processing of everyday tasks
The Importance of
Supporting Automation
• Enterprises must support and encourage
automation to stay competitive
• 68% of workers believe that automation
makes them more productive
• Providing a secure framework for
automation is crucial for success
• Stronger security must be baked into
automation efforts

Recommended for you

cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug

This document provides an overview and guidance for organizations planning a move to cloud collaboration. It discusses why organizations are moving to the cloud, important factors to consider when planning a cloud implementation such as choosing a vendor, conducting a pilot project, reviewing security, migration, and administration. The document emphasizes preparing by evaluating an organization's current environment and processes, as well as planning for user training and help desk support once the cloud is implemented. Key considerations include data security, compliance with regulations, disaster recovery, and service level agreements.

ibm lotus noteslotuslive2011
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise

SharePoint Online vs. On-Premise document compares Microsoft SharePoint Online to an on-premise SharePoint implementation. Some key differences include SharePoint Online having higher security but more limited customization options compared to on-premise which has more robust features but requires managing security. Migrating to SharePoint Online can provide cost savings on licensing and infrastructure but requires planning to address limitations in areas like search and administration interfaces. The document provides considerations for law firms evaluating moving to SharePoint Online.

sharepointwebinarenterprise content management
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case

This slide presentation document discusses building a business case for identity and access management (IAM) automation. It outlines the business challenges of managing user identities, entitlements, and authentication across on-premises and cloud applications. The document discusses the IAM lifecycle and value proposition, providing metrics to measure cost savings, productivity improvements, and security enhancements. It emphasizes effective IAM project implementation by minimizing costs and addressing change management challenges.

identity management access governance softwareiam systemidentity administration and analytics
The Five Barriers to
Automation at Scale
1. Hard-coded credentials make bots
vulnerable to attacks
2. Hard-coded credentials are difficult to
rotate, exposing critical systems to risk
3. Vulnerabilities in bots with hard-coded
credentials create a larger attack
surface
4. Retrieving credentials from a bot is just
the first step in an attacker's access
5. Using the same password in multiple
locations can allow lateral movement
through the organization
Eliminating Manual
Credential Rotation
• Credentials need to be rotated on a
regular basis to reduce the time frame in
which privileged credentials can be used
• Credential rotation is crucial for bots, but
it poses a challenge for automation
engineers and operations teams when
performed manually
• Automatic rotation is a better alternative
to manual rotation as it establishes
policies for how credentials should be
rotated
The Benefits of Centralized
Credential Storage
• Storing credentials in a centralized repository
ensures consistent policies across bots and
applications
• This makes it easier to find and manage
credentials, reducing the risk of loss or
compromise
• More advanced credential management solutions
automate the removal of inactive credentials,
improving operational efficiency
• Citizen developers can follow security best
practices, simplifying the process of granting bots
access to necessary credentials
• By enforcing strong password management
practices, the entire organization can be held to
the same standard of security
Data Handling Best
Practices for Bots
• Bots should only access necessary applications or
databases to prevent compromised bots from
escalating credentials
• Limiting data access is good practice to prevent
exposure of customer data
• Access restriction is especially important for bots
handling confidential data
• Limiting access to necessary data is crucial for
unattended bots
• Bots from one department accessing data from
others increases risk if compromised by attackers
• Aligning bot deployment with security practices
enables digital business and accelerates RPA
deployment

Recommended for you

Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaSWebinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS

The document discusses business process automation and integration platform as a service (iPaaS). It describes the benefits of iPaaS such as increased efficiency, scalability, and ease of use. APPSeCONNECT is presented as an iPaaS that provides quick and easy integration capabilities through a web-based designer, pre-built connectors, and support for triggered and scheduled processes. A demo is given of how APPSeCONNECT can help automate operations for retail businesses through integrations that quickly process orders, update stock levels, and generate invoices.

webinarautomationbusiness process automation
Designing Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase SecurityDesigning Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase Security

"Software security" is becoming a hot topic but true security must go beyond bounds checking and memory leaks. Outside forces such as customer demands, competition and regulatory requirements will eventually force changes in the software architecture so designing a flexible software architecture that reacts to those impacts while maintaining a security state is very critical.

flexibilitysoftware securitylascon
Mlm software development
Mlm software developmentMlm software development
Mlm software development

Cyrus Technoedge provides the excellent MLM software in India which presents all types of the services of MLM request at the side of multilevel marketing meeting and creativity designs for frequent Multi-level marketing activities. If any Query you can call us on 7877778666 and visit us our site: www.mlm-software.co.in

mlm marketingmlm software companybest mlm software
Complete Oversight and
Auditability of Bots
• Bots have administrative access and need
to be monitored
• Audit logs of RPA tools are not always
suited for security purposes
• A robust audit log provides valuable
insight
• Centralized view of audit logs simplifies
investigative analysis
Main Features of CyberArk
Secrets Manager
• Integrates with UiPath to improve efficiency
• Secures privileged identities in a tamper-resistant
repository
• Seamlessly secures retrieval and granting of
credentials to individual robots
• Automates credential rotation in line with
organizational policy
• Secures vaulting and management of privileged
account credentials
• Minimum password complexity for all credentials
• Isolation, control, monitoring, and recording of all
privileged activity
Summary of
Presentation
• Efficiencies with UiPath and CyberArk
• Barriers to Automation
• Eliminating Manual Activities
• Benefits of Centralized Credential
Storage
• Data Handling Best Practices for Bots
• Bot Oversight
24
Efficiencies in RPA
UiPath – Confidential © 2022

Recommended for you

Bomt model- Technology Business Accelerator
Bomt model- Technology Business AcceleratorBomt model- Technology Business Accelerator
Bomt model- Technology Business Accelerator

BOMT model is an innovative hybrid partner product development model by Leo TechnoSoft that offers a low-risk, hassle-free, cost-effective global sourcing strategy, that blends the advantages of traditional outsourcing and captive centers . The Unique Selling Point (USP) of BOMT model is to aid Startups and ISVs’ in reducing their time-to-market. BOMT also creates opportunities for increasing revenue and maximizing ROI at minimum risk.

business modelproduct devlopmentisv's
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf

This presentation will bring insights into how the Zero Trust framework can help organizations improve their cybersecurity posture and resilience and what the organizational challenges are.

zero trustit architecturesecurity
UiPath and Dream to Succeed 2024 RPA Learning Program Kickoff
UiPath and Dream to Succeed  2024 RPA Learning Program KickoffUiPath and Dream to Succeed  2024 RPA Learning Program Kickoff
UiPath and Dream to Succeed 2024 RPA Learning Program Kickoff

Welcome to the UiPath and Dream to Succeed 2024 RPA Learning program Kickoff call. In this session you will learn about the program champions and what the program details are for training students in RPA. Agenda: Welcome to the UiPath and Dream to Succeed 2024 RPA Learning program. Introductions Program details Expectations Ongoing sessions and program schedule

#uipathcommunity#dreamtosucceed
Learning Objectives
Access additional resources
Guide your customers and prospects through how to set up an
enterprise automation program the “right way”
Show your customers what good looks like and the impact that
UiPath can have on their business
Know how to intervene with customers who have not setup their
programs correctly
There are 5 critical things to get right to
maximize the value of an intelligent
automation program
STRATEGY & ALIGNMENT
Right reasons
1
VALUE IDENTIFICATION
Right demand
2
DESIGN & STRUCTURE
Right program
governance & execution
3
VALUE REALIZATION
Right accounting
4
CHANGE MANAGEMENT
Right communications
5
STRATEGY & ALIGNMENT
Elements What Good Looks Like Signs of Mis-alignment
• Existing business goals and strategies
provide automation program focus
and priorities
• Business leaders drive the
automation program
• IT is a required partner supporting
delivery
• Business measures impact of
program against strategic goals
• Business + IT partnership
• The goal is “digital transformation”
• Target number of processes to
automate
• Program lead define “locally
optimized”goals and measures
Automation is a means to an end
Right reasons
1
PLANNED BUSINESS OUTCOMES
& MEASURES
BUSINESS GOALS & STRATEGIES
1
0
1
0
1
0
1
0
1
0
1
0 1
0 1
0
1
0
1
0
1
0
1
0
0
0
1
0
1
0 1
0
0
1
0
1
0 1
0
1
0
0 1
0
Digital automation enablement
VALUE IDENTIFICATION
Elements What Good Looks Like Signs of Mis-alignment
• Pipeline opportunities are assessed
against business goals for
prioritization
• Governance to enforce alignment
• Discovery Team + Technology
• Top opportunities are material against
business strategy and goals
• Discovery team performs opportunity
identification with business leadership
• Discovery technologies produce
additional data-driven opportunities
• Crowdsourcing / Roadshows utilized to
build awareness and Citizen
Development pipeline
• Program team (COE) or IT is trying to
sell the capabilities of automation to
the business
• Attempts to “crowdsource”ideas
from all employees as the main
method to build pipeline
Business Goals drive the“Pipeline”
Right demand
2
Business Analysts
(via Bus Leaders)
Business Team /
Citizen Developers
Automated
Discovery
SOURCES OF DEMAND BUSINESS VALUE FILTER PRIORITIZED AUTOMATION PIPELINE & ROADMAP
• Business value measures
• Automation potential
OPPORTUNITY PORTFOLIO VALUE ROADMAP

Recommended for you

What is an RPA CoE? Session 4 – CoE Scaling
What is an RPA CoE? Session 4 – CoE ScalingWhat is an RPA CoE? Session 4 – CoE Scaling
What is an RPA CoE? Session 4 – CoE Scaling

How to scale a COE to meet organizational missions. Topics covered: • What is the original focal area? • How to expand the COE globally. • Is a centralized or decentralized model better for scaling? Speaker: Chris Bolin, Senior Intelligent Automation Architect Anika Systems

#uipath#uipathcommunity#coe
What is an RPA CoE? Session 3 – CoE Architecture
What is an RPA CoE?  Session 3 – CoE ArchitectureWhat is an RPA CoE?  Session 3 – CoE Architecture
What is an RPA CoE? Session 3 – CoE Architecture

How do Systems, Information Security, and Solutions enable the CoE? Topics covered: • Is the organization a public one and how does that impact automations? • What type of resources are available to build a pipeline? Speaker: Chris Bolin, Senior Intelligent Automation Architect Anika Systems

#uipathcommunity#uipath#coe
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2

This session is focused on setting up Project, Train Model and Refine Model in Communication Mining platform. We will understand data ingestion, various phases of Model training and best practices. • Administration • Manage Sources and Dataset • Taxonomy • Model Training • Refining Models and using Validation • Best practices • Q/A

#uipathcommunity#uipath#communicationsmining
DESIGN & STRUCTURE
Elements What Good Looks Like Cautions
• Team structure and size is aligned
against a robust pipeline of
opportunities
• Pipeline opportunities move to
delivery <3 months of being
submitted
• Existence of dedicated production
support / BAU pod
• Agility to scale – new pods within a
few weeks
• Opportunities languishing in pipeline
resulting in business disengagement
• All internal resources – no ability to
quickly scale or retain talent
Design the organization to fit the
objective
Right program
governance & execution
3
FACTORS TO CONSIDER WHEN DESIGNING YOUR DELIVERY TEAM
VALUE REALIZATION
Elements What Good Looks Like Mis-alignments
• Automation value is anchored to
business unit objectives and
measures
• Each automation project’s value is
jointly agreed to by business unit and
automation team in advance
• Reporting
• Dashboards & reports
• Steering Committees
• Program Evolution
• Quarterly Program Assessments
• Value Realization
• Achievement accountability
• Traceability to top-level metrics
• Automation team tracks “counts”
rather than value
• Business cannot articulate the value
of automation
Value only recognized by the
business
Right accounting
4
VALUE ACCOUNTING
CATEGORIES & METHODS
• Cost
• Quality
• Speed
• Experience
• Risk / Compliance
• Revenue
PLANNED VS. ACTUAL BUSINESS
OUTCOMES & MEASURES
Planned Actual
Actual
Planned
Steering Committee
Business Leaders
Functional
Teams
BUSINESS LEADER & STAKEHOLDER
REVIEWS
UiPath ©2021 - Confidential
CHANGE MANAGEMENT
Elements What Good Looks Like Mis-alignments
• Program branding
• Communication to all stakeholders
across all phases of the program
lifecycle
• Business-led communications
• To all stakeholders across all phases
of the program lifecycle
• Feedback loop from stakeholders for
continuous improvement
• Service delivery consistency and
predictability
• Operating model, processes, and role
changes planned and communicated
• Business expects the automation to
work flawlessly the first day in
production
• Business expects the automation to
always adjust to changes in the
environment
• Business has not planned what to do
with “freed up capacity” when
automation is live
Automation is business change
Right communications
5
GOALS
TIMING
WIIFM
IMPACTS
PROGRAM
PURPOSE &
FOCUS
Managers
Teams
Executives
PROGRAM BRAND ALL STAKEHOLDER LEVELS AND TEAMS
COMMUNICATIONS
FEEDBACK
RESULTS

More Related Content

Similar to Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2

Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Teemu Tiainen
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
Techcello
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
Chris Haddad
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
kanimozhin
 
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace SolutionsEnhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
Sanjay Willie
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
ForgeRock
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
SafetyChain Software
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQ
ServiceRocket
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
dominion
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
Evan Hodges
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
Hitachi ID Systems, Inc.
 
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaSWebinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
APPSeCONNECT
 
Designing Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase SecurityDesigning Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase Security
lawmoore
 
Mlm software development
Mlm software developmentMlm software development
Mlm software development
mlmsoftwarecyrus
 
Bomt model- Technology Business Accelerator
Bomt model- Technology Business AcceleratorBomt model- Technology Business Accelerator
Bomt model- Technology Business Accelerator
Leo TechnoSoft
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern
 

Similar to Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2 (20)

Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace SolutionsEnhancing Contact Centers Through Open Source Digital Workplace Solutions
Enhancing Contact Centers Through Open Source Digital Workplace Solutions
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQ
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaSWebinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
 
Designing Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase SecurityDesigning Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase Security
 
Mlm software development
Mlm software developmentMlm software development
Mlm software development
 
Bomt model- Technology Business Accelerator
Bomt model- Technology Business AcceleratorBomt model- Technology Business Accelerator
Bomt model- Technology Business Accelerator
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 

More from DianaGray10

UiPath and Dream to Succeed 2024 RPA Learning Program Kickoff
UiPath and Dream to Succeed  2024 RPA Learning Program KickoffUiPath and Dream to Succeed  2024 RPA Learning Program Kickoff
UiPath and Dream to Succeed 2024 RPA Learning Program Kickoff
DianaGray10
 
What is an RPA CoE? Session 4 – CoE Scaling
What is an RPA CoE? Session 4 – CoE ScalingWhat is an RPA CoE? Session 4 – CoE Scaling
What is an RPA CoE? Session 4 – CoE Scaling
DianaGray10
 
What is an RPA CoE? Session 3 – CoE Architecture
What is an RPA CoE?  Session 3 – CoE ArchitectureWhat is an RPA CoE?  Session 3 – CoE Architecture
What is an RPA CoE? Session 3 – CoE Architecture
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
UiPath and Dream to Succeed Student Account Session
UiPath and Dream to Succeed Student Account SessionUiPath and Dream to Succeed Student Account Session
UiPath and Dream to Succeed Student Account Session
DianaGray10
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Intelligent Document Processing presented by the South Florida Community Chapter
Intelligent Document Processing presented by the South Florida Community ChapterIntelligent Document Processing presented by the South Florida Community Chapter
Intelligent Document Processing presented by the South Florida Community Chapter
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person event
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
DianaGray10
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
DianaGray10
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
DianaGray10
 

More from DianaGray10 (20)

UiPath and Dream to Succeed 2024 RPA Learning Program Kickoff
UiPath and Dream to Succeed  2024 RPA Learning Program KickoffUiPath and Dream to Succeed  2024 RPA Learning Program Kickoff
UiPath and Dream to Succeed 2024 RPA Learning Program Kickoff
 
What is an RPA CoE? Session 4 – CoE Scaling
What is an RPA CoE? Session 4 – CoE ScalingWhat is an RPA CoE? Session 4 – CoE Scaling
What is an RPA CoE? Session 4 – CoE Scaling
 
What is an RPA CoE? Session 3 – CoE Architecture
What is an RPA CoE?  Session 3 – CoE ArchitectureWhat is an RPA CoE?  Session 3 – CoE Architecture
What is an RPA CoE? Session 3 – CoE Architecture
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
UiPath and Dream to Succeed Student Account Session
UiPath and Dream to Succeed Student Account SessionUiPath and Dream to Succeed Student Account Session
UiPath and Dream to Succeed Student Account Session
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Intelligent Document Processing presented by the South Florida Community Chapter
Intelligent Document Processing presented by the South Florida Community ChapterIntelligent Document Processing presented by the South Florida Community Chapter
Intelligent Document Processing presented by the South Florida Community Chapter
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person event
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 

Recently uploaded

20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 

Recently uploaded (20)

20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 

Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2

  • 1. 4/3/2024 Efficiencies with UiPath and CyberArk The UiPath word mark, logos, and robots are registered trademarks owned by UiPath, Inc. and its affiliates. ©2023 UiPath. All rights reserved.
  • 2. Diana Gray Senior Community Marketing Manger, AMER @UiPath Meet the Team Brian Carpenter Joshua Gregory Jeremy Patton Stuart McEntee Polo Perez Sales Engineer @UiPath, Inc. Senior Presales Technical Consultant @UiPath, Inc. Solutions Engineer – DevOps @ CyberArk Sales – Secrets Manager Sales Specialist @ CyberArk Senior Director of Business Development @ CyberArk
  • 3. About today’s meeting: • Welcome to the UiPath and CyberArk Webinar Sessions • We will be recording these sessions, so please keep yourself on mute unless the speaker ask if you have any questions. • The recording will be available tomorrow and I will put the url in chat, where you can find it under the wrap up tab at the top of the page. • You are encouraged to put any questions that you have in chat • These sessions are designed for you to engage with us on topics that interest you, so please let us know your thoughts and feel free to share your experiences during the Q&A session. • If you have any additional topics that you want us to cover, please email me @ diana.gray@uipath.com
  • 4. Agenda • Value of Leveraging CyberArk with UiPath, recap • Efficiencies with UiPath and CyberArk • Barriers to Automation • Eliminating Manual Activities • Benefits of Centralized Credential Storage • Data Handling Best Practices for Bots • Bot Oversight • Secrets Manager
  • 5. • Left unmanaged and unprotected, privileged credentials can transform RPA into a backdoor for bad actors to access corporate IT infrastructure • Bad actors can access same systems, applications and data as software robots using acquired privileged credentials • Login process appears genuine, making detection of suspicious activity unlikely • Bad actors can manipulate, compromise and exfiltrate confidential or commercially sensitive information • Bad actors tend to make lateral moves to other systems and applications, further penetrating an organization's infrastructure • Compromised privileged credentials can lead to financial losses, reputational damage and diminished customer loyalty
  • 6. Allow security and development teams to dynamically manage the applications’ secrets required to access resources and services across hybrid and multi-cloud environments without impacting agility. Privileged credentials are often called “SECRETS” and refer to a private piece of information that acts as a key to unlock protected resources or sensitive information in tools, databases, applications, containers, DevOps and cloud-native environments. SECRETS MANAGER GOAL 6 Human Access Non-Human Access 1 person 45 apps/tools workloads service accounts Cloud- Hybrid Cloud Data Center Kubernetes RPA CI/CD Scripts Containers Vulnerability Scanner Home grown apps SolarWinds Octopus Codecov Uber Stuart McEntee, CISSP CyberArk Secrets Manager Specialist stuart.mcentee@cyberark.com www.cyberark.com SEC Ruling: https://www.sec.gov/news/press-release/2023-139
  • 7. 7 Key Benefits Developers Simplicity: Native integrations simplify securing DevOps tools, CI/CD, ISV to zOS and everything in between. Security Robust Security: Centralized management, rotation, audit and strong authentication ensures workloads securely access to secrets. Operations Efficiency & Availability: Architected to ensure secrets are always available when and where they are needed. Secrets Hub …Not a single product or one-time event
  • 8. J2EE App Server DS CP 8 CP Application Script SDK CLI Credential Provider(s) Varonis, Venafi, ForeScout,, Broadcom, HPE, Ping Identity, Rapid7, SailPoint, ServiceNow, Splunk, Symantec, Scripts Application Server , Provider(s) Apache Tomcat, IBM WebSphere, Oracle WebLogic, Red Hat JBoss Conjur Enterprise Ansible*, AWS, Azure, CloudBees, Docker, Entrust HSM, GitLab, Kubernetes, OpenShift, Puppet, Terraform, VMWare Tanzu AWS Secrets Manager Azure Key Vault (Google future) Secrets Hub Application Script Rest Rest Central Credential Provider(s) Chef, Datamatics, IBM Urbancode, Jenkins, LogicMonitor, Palo Alto Networks, Qualys, PKWare, Tenable, UiPath* 443 CP Agent-Based Agentless SaaS Priv Cloud Conjur Cloud 1858 SECRETS MANAGEMENT IS A CROSS-DOMAIN, HYBRID STRATEGY & PROGRAM
  • 9. 9 MOST COMPLETE & EXTENSIBLE IDENTITY SECURITY PLATFORM BROADEST INTEGRATION SUPPORT IDENTITY SECURITY INNOVATOR PROVEN EXPERTISE IN SECURING IDENTITY • Manages secrets for apps, automation scripts, non-human identities AND human users • Centralized secrets management • 200+ integrations with top DevOps tools, platforms and COTS apps • Work with partners and open-source communities to certify and expand • Secrets rotation with zero downtime • Zero /minimal code changes for devs, e.g., ASCP, Secretless • Data segregation with centralized management • Entire company focused on security • Expert in partnering with security teams • Trusted by over half Fortune 500 ARCHITECTED FOR THE MODERN ENTERPRISE • High availability architecture • High performance & scale - unique read-only follower architecture • Innovative solutions for securing mission critical legacy apps SECRETS MANAGER ALIGNMENT TO CYBERARK DIFFERENTIATORS
  • 10. 10 Credential Management Now we highlighted the importance of bot identities, it’s mandatory to periodically check and maintain all accounts’ permissions and configurations Credential manager All accounts should be stored in a common credential manager that allows each team member to access required dev/prod accounts based on their team role (dev, support, business analysts) Periodically change account passwords to enhance security and compliance guidelines Regularly rotating account passwords limits risks of sharing or leaking Some processes might have been decommissioned and the associated account is no longer required This can be easily tracked with an Internal Process Inventory that contains real-time production processes information like name, deployment location, accounts used etc.
  • 11. 11 Add a credential store Natively link your CyberArk store with UiPath
  • 13. Efficiencies with UiPath and CyberArk • UiPath and CyberArk together improves efficiency • Combines RPA with privileged access management
  • 14. Cost Savings • Software robots process tasks faster than humans resulting in cost savings • RPA can help organizations take advantage of early payment discounts • Working at a faster pace enables additional process-specific savings
  • 15. Scalability and Efficiency • Robots work around the clock, and RPA processes can be scaled easily across countries and business units • Software robots carry out tasks faster and at a steady rate for as long as required • Robots could help organizations speed up the processing of everyday tasks
  • 16. The Importance of Supporting Automation • Enterprises must support and encourage automation to stay competitive • 68% of workers believe that automation makes them more productive • Providing a secure framework for automation is crucial for success • Stronger security must be baked into automation efforts
  • 17. The Five Barriers to Automation at Scale 1. Hard-coded credentials make bots vulnerable to attacks 2. Hard-coded credentials are difficult to rotate, exposing critical systems to risk 3. Vulnerabilities in bots with hard-coded credentials create a larger attack surface 4. Retrieving credentials from a bot is just the first step in an attacker's access 5. Using the same password in multiple locations can allow lateral movement through the organization
  • 18. Eliminating Manual Credential Rotation • Credentials need to be rotated on a regular basis to reduce the time frame in which privileged credentials can be used • Credential rotation is crucial for bots, but it poses a challenge for automation engineers and operations teams when performed manually • Automatic rotation is a better alternative to manual rotation as it establishes policies for how credentials should be rotated
  • 19. The Benefits of Centralized Credential Storage • Storing credentials in a centralized repository ensures consistent policies across bots and applications • This makes it easier to find and manage credentials, reducing the risk of loss or compromise • More advanced credential management solutions automate the removal of inactive credentials, improving operational efficiency • Citizen developers can follow security best practices, simplifying the process of granting bots access to necessary credentials • By enforcing strong password management practices, the entire organization can be held to the same standard of security
  • 20. Data Handling Best Practices for Bots • Bots should only access necessary applications or databases to prevent compromised bots from escalating credentials • Limiting data access is good practice to prevent exposure of customer data • Access restriction is especially important for bots handling confidential data • Limiting access to necessary data is crucial for unattended bots • Bots from one department accessing data from others increases risk if compromised by attackers • Aligning bot deployment with security practices enables digital business and accelerates RPA deployment
  • 21. Complete Oversight and Auditability of Bots • Bots have administrative access and need to be monitored • Audit logs of RPA tools are not always suited for security purposes • A robust audit log provides valuable insight • Centralized view of audit logs simplifies investigative analysis
  • 22. Main Features of CyberArk Secrets Manager • Integrates with UiPath to improve efficiency • Secures privileged identities in a tamper-resistant repository • Seamlessly secures retrieval and granting of credentials to individual robots • Automates credential rotation in line with organizational policy • Secures vaulting and management of privileged account credentials • Minimum password complexity for all credentials • Isolation, control, monitoring, and recording of all privileged activity
  • 23. Summary of Presentation • Efficiencies with UiPath and CyberArk • Barriers to Automation • Eliminating Manual Activities • Benefits of Centralized Credential Storage • Data Handling Best Practices for Bots • Bot Oversight
  • 24. 24 Efficiencies in RPA UiPath – Confidential © 2022
  • 25. Learning Objectives Access additional resources Guide your customers and prospects through how to set up an enterprise automation program the “right way” Show your customers what good looks like and the impact that UiPath can have on their business Know how to intervene with customers who have not setup their programs correctly
  • 26. There are 5 critical things to get right to maximize the value of an intelligent automation program STRATEGY & ALIGNMENT Right reasons 1 VALUE IDENTIFICATION Right demand 2 DESIGN & STRUCTURE Right program governance & execution 3 VALUE REALIZATION Right accounting 4 CHANGE MANAGEMENT Right communications 5
  • 27. STRATEGY & ALIGNMENT Elements What Good Looks Like Signs of Mis-alignment • Existing business goals and strategies provide automation program focus and priorities • Business leaders drive the automation program • IT is a required partner supporting delivery • Business measures impact of program against strategic goals • Business + IT partnership • The goal is “digital transformation” • Target number of processes to automate • Program lead define “locally optimized”goals and measures Automation is a means to an end Right reasons 1 PLANNED BUSINESS OUTCOMES & MEASURES BUSINESS GOALS & STRATEGIES 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 1 0 0 1 0 Digital automation enablement
  • 28. VALUE IDENTIFICATION Elements What Good Looks Like Signs of Mis-alignment • Pipeline opportunities are assessed against business goals for prioritization • Governance to enforce alignment • Discovery Team + Technology • Top opportunities are material against business strategy and goals • Discovery team performs opportunity identification with business leadership • Discovery technologies produce additional data-driven opportunities • Crowdsourcing / Roadshows utilized to build awareness and Citizen Development pipeline • Program team (COE) or IT is trying to sell the capabilities of automation to the business • Attempts to “crowdsource”ideas from all employees as the main method to build pipeline Business Goals drive the“Pipeline” Right demand 2 Business Analysts (via Bus Leaders) Business Team / Citizen Developers Automated Discovery SOURCES OF DEMAND BUSINESS VALUE FILTER PRIORITIZED AUTOMATION PIPELINE & ROADMAP • Business value measures • Automation potential OPPORTUNITY PORTFOLIO VALUE ROADMAP
  • 29. DESIGN & STRUCTURE Elements What Good Looks Like Cautions • Team structure and size is aligned against a robust pipeline of opportunities • Pipeline opportunities move to delivery <3 months of being submitted • Existence of dedicated production support / BAU pod • Agility to scale – new pods within a few weeks • Opportunities languishing in pipeline resulting in business disengagement • All internal resources – no ability to quickly scale or retain talent Design the organization to fit the objective Right program governance & execution 3 FACTORS TO CONSIDER WHEN DESIGNING YOUR DELIVERY TEAM
  • 30. VALUE REALIZATION Elements What Good Looks Like Mis-alignments • Automation value is anchored to business unit objectives and measures • Each automation project’s value is jointly agreed to by business unit and automation team in advance • Reporting • Dashboards & reports • Steering Committees • Program Evolution • Quarterly Program Assessments • Value Realization • Achievement accountability • Traceability to top-level metrics • Automation team tracks “counts” rather than value • Business cannot articulate the value of automation Value only recognized by the business Right accounting 4 VALUE ACCOUNTING CATEGORIES & METHODS • Cost • Quality • Speed • Experience • Risk / Compliance • Revenue PLANNED VS. ACTUAL BUSINESS OUTCOMES & MEASURES Planned Actual Actual Planned Steering Committee Business Leaders Functional Teams BUSINESS LEADER & STAKEHOLDER REVIEWS
  • 31. UiPath ©2021 - Confidential CHANGE MANAGEMENT Elements What Good Looks Like Mis-alignments • Program branding • Communication to all stakeholders across all phases of the program lifecycle • Business-led communications • To all stakeholders across all phases of the program lifecycle • Feedback loop from stakeholders for continuous improvement • Service delivery consistency and predictability • Operating model, processes, and role changes planned and communicated • Business expects the automation to work flawlessly the first day in production • Business expects the automation to always adjust to changes in the environment • Business has not planned what to do with “freed up capacity” when automation is live Automation is business change Right communications 5 GOALS TIMING WIIFM IMPACTS PROGRAM PURPOSE & FOCUS Managers Teams Executives PROGRAM BRAND ALL STAKEHOLDER LEVELS AND TEAMS COMMUNICATIONS FEEDBACK RESULTS