intro banner-jan-2021


Why attend this webinar?

The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.

Steps to adopt a Zero Trust model:

  • Provide frictionless access with MFA and SSO

  • Validate changes with a request and approve process

  • Employ the principle of least privilege (POLP) and just-in-time (JIT) access

  • Disable accounts of former employees automatically

  • Monitor and audit privileged user activity



Why attend this webinar?

A new family of ransomware known as Snake (aka EKANS or SNAKEHOSE) was discovered in January 2020. Scripted in the Go programming language, this new breed of ransomware is heavily obfuscated and is known to target an entire network rather than individual workstations.

This dangerous new ransomware type that has the victims’ details hard-coded into it has sunk its teeth into many business enterprise networks, especially in industrial control system (ICS) environments.


Why attend this webinar?

  • Overview of Snake ransomware

  • Discovering critical network misconfigurations and default Windows platform vulnerabilities that can expose your organization to this ransomware

  • Spotting the tell-tale signs to detect the presence of Snake ransomware in your network

  • Building a comprehensive defense strategy to not only prevent Snake from slithering into your network, but also other families of ransomware such as Maze, Ragnar Locker, and CoronaVirus

Register for this webinar



Get the best out of ADSelfService Plus

  • Implement conditional access based on risk factors such as the user’s IP address, time of access, and geolocation.

  • Enforce MFA for VPN logons to protect remote workforce.

  • Enhanced password policy for a hybrid environment.

Register for this webinar


Why attend this webinar?

With the MITRE ATT&CK framework, you can understand the modus-operandi of potential attackers, and be better prepared to defend your organization. But how exactly can you use this framework within your SIEM solution to derive actionable security analytics? And how can you use these security analytics for efficient threat detection and response?
Join us in this webinar to learn more.


  • The tactics, techniques and procedures covered in the MITRE ATT&CK framework.

  • Bringing MITRE ATT&CK into a SIEM for enhanced threat detection.

  • Using automated incident response capabilities to mitigate attacks.

  • Live demo of how ManageEngine Log360 applies MITRE ATT&CK.

Register for this webinar


Why attend this webinar?

Tried and true, Active Directory (AD) is solely responsible for controlling access to all the networked resources in an organization. Being the single authority for authentication and authorization, AD is the backbone of most enterprises. However, with great power comes great responsibility, right? If not configured properly and handled efficiently, AD can cause serious damage to your organization’s security posture.

Webinar highlights:

  • Examine from scratch the native AD tools and components, especially the key components that are responsible for dictating resource access in the network.

  • Learn to configure and implement security access controls hands-on using the native toolsets and identify the drawbacks/limitations

  • Choose the right IAM strategy for on-premises, cloud, and hybrid deployments with AD360.Explore and fill the security gaps to protect sensitive users and critical resources from abuse.

Register for this webinar



Misconfigurations are one of the fastest-growing security risks that pave the way for threat-actors to intrude into the network. Attackers have now started to realize that leveraging existing security vulnerabilities or misconfigurations in software is a quicker way to to gain access to organizations’ sensitive resources and data. To make things more difficult, such attack techniques are difficult to detect by most traditional security solutions as they exploit the operational flaws.


In this webinar, we’ll help you:

  • Identify the various vulnerabilities and exploitable bugs that can be leveraged by threat actors to intrude into your network.

  • Understand how network misconfigurations and administration mishaps can be the root cause of a security breach, or a propagation factor.

  • Gain complete control over your network by adopting a multi-layer security approach to identify and mitigate vulnerabilities and misconfigurations across popular apps and platforms such as Active Directory (AD),Exchange Servers, cloud infrastructures such as Azure AD, network devices and more.

Register for this webinar

Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.