FREE LIVE WEBINARS
5th, 11th, 12th, 18th, 19th, and 25th of April 2023
Webinar 1: 5th April 1pm EEST
7 GPO misconfigurations to rectify under 30 mins
READ MORE
Why attend this webinar?
Group Policy Objects (GPOs) regulate security and access within an AD environment. They are extremely powerful and equally complicated. The sheer number of GPOs, the way they coexist, and their unpredictable order of precedence requires administrators to have high levels of mastery. An uninformed change to a GPO can affect the way users interact with your network permanently. It’s crucial to take utmost care while configuring GPOs. Of course, there is always the possibility of misconfiguring a setting or two in the grand scheme of things. In this webinar, we have put together 7 GPO misconfigurations that you can rectify in under 30 mins to boost the security of your organization.
Agenda:
GPOs, and how to keep track of them
GPO misconfigurations to fix around users, devices, and data
Rectifying misconfigurations using native and powerful solutions
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 2: 11th April 9am EEST
Ensure identity security and kick-start your Zero Trust journey with ADSelfService Plus
READ MORE
Why watch this webinar?
According to Verizon’s 2022 Data Breach Investigations Report, 81% of data breaches involve stolen or weak credentials. Identity-based attacks are on the rise, and it has become essential to put identities at the forefront of your security strategy. Don’t worry, this is not as complicated as it sounds. Join this webinar as we walk you through some simple steps to form an identity-centered security approach with Zero Trust at the core.
In this webinar, you’ll learn about:
ADSelfService Plus: A power-packed identity security solution to help kick-start your Zero Trust journey
How to secure endpoints by enforcing MFA and strong passwords
How to implement an approval workflow to monitor critical AD changes
How to reduce the attack surface by enabling SSO and passwordless authentication
Leveraging insightful reports to identify bad actors at the earliest stages of an attack and decide how to respond
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 3: 12th April 1pm EEST
Building a comprehensive data security strategy
READ MORE
Why attend this webinar?
As organizational perimeters become non-existent, data-centric security has taken center stage. In this webinar, we’ll discuss how you can prioritize your sensitive data and ensure it is secured in all its states. Join us to exchange insights and receive answers to your data security questions and concerns.
This webinar will cover:
Addressing blind spots in data security
The anatomy of a breach
Understanding data at rest, in use, and in motion
What constitutes a data security strategy
Data security techniques you need to implement
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 4: 18th April 1pm EEST
The evolution of AI and ML in cybersecurity
READ MORE
Intro/abstract
Artificial intelligence and machine learning are critical for a mature cybersecurity program. These technologies enable organizations to detect time, count, and pattern anomalies; and compute a risk score for every user and entity in the network. Instead of writing threat detection rules, security analysts can rely on the system learning on its own and alerting them about potential threats. AI and ML in cybersecurity helps decrease false positives, while increasing the occurrence of true positives. Join us in this webinar to learn how AI and ML in cybersecurity have evolved, what they hold for us in the future, and the main elements of an ML-based SIEM solution.
Agenda:
Understanding how AI and ML in cybersecurity began
Detecting time, count, and pattern anomalies
Scoring risks for proactive security
Analyzing peer groups and seasonal factors to improve risk scoring
Modeling anomalies for added flexibility, precision, and effectiveness
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 5: 19th April 1pm EEST
4 MFA best practices to secure endpoints
READ MORE
Why attend this webinar?
MFA prevents 80 to 90% of cyberattacks, according to Anne Neuberger, American national security official. With cyberattacks becoming more sophisticated and advanced by the day, implementing MFA alone will not get you through. Join this webinar and learn best practices to maximize the benefits of implementing MFA and bolster your endpoint security.
What you’ll learn:
Why is MFA critical in today’s threat landscape
How MFA can thwart common cyberattacks and bolster your endpoint security
4 MFA best practices to secure endpoints
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 6: 25th April 1pm EEST
Taking a proactive security approach with threat hunting
READ MORE
Why attend this webinar?
Unknown sophisticated threats can intrude on a network and evade detection for around 280 days on average. With effective threat hunting, you will be able to reduce the time taken to detect an attacker’s presence, thereby minimizing the damage as well. In this webinar, we’ll look into some threat hunting methods and how your organization can formulate a proactive approach to cybersecurity.
Agenda:
Why threat hunting should be an essential component of your defense strategy
Threat hunting methods
What you need to get started with threat hunting
How a SIEM solution can help
REGISTER FOR THIS WEBINAR
Register for this webinar