Webinar 1: 12th Aug 1pm EEST, 13th Aug 2 PM EDT
Active Directory security fundamentals 45 mins
Why attend this webinar?
Tried and true, Active Directory (AD) is solely responsible for controlling access to all the networked resources in an organization. Being the single authority for authentication and authorization, AD is the backbone of most enterprises. However, with great power comes great responsibility, right? If not configured properly and handled efficiently, AD can cause serious damage to your organization’s security posture.
In this webinar, we’ll:
Observe the problems associated with password creation rules in traditional in-house environments and custom cloud-based applications.
Eliminate password reuse, and maintain a security baseline by enforcing a uniform password policy across all logon modes.
Mitigate password chaos for your end users by establishing a single point of logon with single sign-on (SSO).
Webinar 2: 18th Aug 1pm EEST, 19th June 11am EDT
Top five identity management hacks for a modern IAM system 45 mins
Why attend this webinar?
Sign up for our webinar to learn the benefits of overhauling legacy identity and access management (IAM) practices, and moving forward with a latter-day approach.
In this webinar, you’ll learn about:
Improve the efficiency of the hiring and offboarding process
Handle employee modifications in bulk
Eliminate dependency on HR teams
Align your business needs with IT processes
Automate the process to reduce data entry errors
Webinar 3: 19th Aug 1pm EEST, 20th Aug 2pm EDT
Tips and tricks for deploying a SIEM solution 45 mins
Why attend this webinar?
Even though security information and event management (SIEM) solutions have been around for many years, organizations still struggle to achieve effective security monitoring. SIEM solutions have certainly evolved over time, but even the most advanced AI-powered analytics won’t get the job done unless basic log management practices are in place. This webinar will help you successfully plan your SIEM deployment and ensure your plans come to fruition.
We’ll cover:
Important considerations while deploying a SIEM solution.
Fundamental capabilities of a SIEM solution.
The data that must be collected from your infrastructure.
Analytical techniques you must employ to gain actionable insights.
Webinar 4: 25th Aug 1pm EEST, 26th Aug 2pm EDT
Secure endpoints with two-factor authentication (2FA) 45 mins
Why attend this webinar?
Social engineering attacks have increased and the advancements in these attacking techniques sure cause a concern about organization’s security. The easiest way to break into a network is by misusing a user’s identity. A strong password can also be compromised and we have to come to terms with password strengthening not being the only answer to protecting user accounts from these attacks.
Join our product expert in this session to learn how to boost your organization’s security with an additional layer of authentication.
In this webinar, you’ll learn how to:
The security incident life cycle.
Advanced incident detection.
Incident response and management.
Webinar 5: 26th Aug 1pm EEST, 27th Aug 2pm EDT
Identifying security misconfigurations that can lead to breaches 45 mins
Why attend this webinar?
Sophisticated, high profile breaches often get the most attention, and rightfully so. After all, traversing between multiple systems, and stealing user credentials to access sensitive data hosted on a critical machine does demand attention. But more often than not, when we start to investigate a breach, we often tend to oversee the simple configuration mistakes and management mishaps. These simple mistakes could be the root causes of the breach, or at the very least a propagation factor.
In this webinar, we’ll:
Go behind-the-scenes some of the most devastating breaches on hybrid IT environments in 2020.
Replicate the breaches live, to analyze and determine the possible configuration errors and management practices that could’ve facilitated the breach.
Create a security and monitoring plan to identify misconfigured permissions, and detect and alert on anolamous activities performed under the context of the permissions.
Webinar 6: 24th May 1pm EEST, 25th June 2pm EDT
Choosing the right enterprise IAM strategy for Active Directory and Azure Active Directory 45 mins
Why attend this webinar?
Do the right people have the right access to resources? What are the users doing with their access? Are there sufficient methods to control access? Whether your environment is a cloudless ecosystem, in the cloud, or a hybrid of both, it’s crucial to choose the right identity and access governance approach.
In this webinar, you’ll learn to:
Learn about various identity and access management (IAM) strategies offered by Active Directory (AD) and Azure AD.
Determine possible limitations of IAM approaches in AD and Azure AD.
Choose the right IAM strategy for on-premises, cloud, and hybrid deployments with AD360.