FREE LIVE WEBINARS
5th, 11th, 20th, 25th & 26th of May 2021
Webinar 1: 5th May 1pm EEST
Secure user identities to establish Zero Trust 45 mins
Why attend this webinar?
The first step to establishing zero trust in a hybrid infrastructure begins with implementing password security for all users. This should include a fail-proof password policy and multi-factor authentication (2FA) on all accounts that support it.
Learn to achieve this the ADSelfService Plus way.
Agenda:
-
NIST & NCSC password guidelines and best practices.
-
Conditional access based on risk factors.
-
MFA for self-service & logons.
-
One-click access with single sign-on.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 2: 11th May 1pm EEST
Understanding the building blocks of a SIEM solution 45 mins
Why attend this webinar?
One of the harshest realities of the cybersecurity world is that preventive measures, no matter how advanced, cannot entirely stop every attack from intruding your network. Time after time, security incidents on highly protected infrastructures have confirmed the need for a full time incident monitoring and response program, in other words, a security information and event management (SIEM) solution. SIEM functions as a single window for the security of your entire network— it brings logs together into a centralized location and restructures them into digestible format for examination.
However, it’s really not that simple. There are multiple factors that need to be considered before implementing or purchasing a SIEM solution.
In this webinar, we will answer the following questions:
-
Do you really need a SIEM solution in 2021? Does business size or IT environment influence the effectiveness of a SIEM software?
-
What are the vital factors that should influence your decision of purchasing a SIEM software? For Eg: Scalability, license cost, lT environment compatibility?
-
Can ManageEngine Log360 be the perfect SIEM that solves your cybersecurity requirements?
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 3: 20th May 1pm EEST
How to spot attackers in your Active Directory 45 mins
Why attend this webinar?
Cyberattackers of today have numerous sophisticated ways to attack an organization’s Active Directory (AD) infrastructure. Once they get in, they can wreak some serious havoc. And then there is the continuous threat of trusted insiders who can compromise your AD.
In this webinar, we will explore how you can proactively spot attackers in your AD.
We will cover:
-
Why monitoring and protecting your AD is critical.
-
Some AD best practices to improve security.
-
Live demo of an Active Directory attack.
-
Techniques for detecting presence of attackers.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 4: 25th May 1pm EEST
Why Zero Trust should be at the forefront of your IAM strategy 45 mins
Why attend this webinar?
The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.
Steps to adopt a Zero Trust model:
-
Provide frictionless access with MFA and SSO.
-
Validate changes with a request and approve process.
-
Employ the principle of least privilege (POLP) and just-in-time (JIT) access.
-
Disable accounts of former employees automatically.
-
Monitor and audit privileged user activity.
Webinar 5: 26th May 1pm EEST
Ultimate password cracking techniques in 2021: What’s at stake? 45 mins
Why attend this webinar?
Passwords have always been one of the quickest ways to gain access to an IT environment. Establishing an initial foothold in the network is the most complex phase of a cyberattack kill chain and an exposed password at even a single endpoint can enable attackers to gain that initial level of access in your network. Almost every security attack involves gaining access to plaintext passwords or hashes at different stages. Password security techniques, such as Multi-Factor Authentication (MFA), have come a long way in improving password security, but threat-actors have always devised new strategies to crack passwords.
In this webinar, we will:
-
Understand the evolution of password-based attacks in 2021, and observe the techniques (from an elementary to advanced level) employed to crack passwords in IT environments such as Microsoft Active Directory (AD) , Azure AD, AWS and more.
-
Perform Root Cause Analysis (RCA) to understand the reason behind weak passwords and IT management practices that expose passwords in a network.
-
Build a comprehensive security strategy that will help you strengthen password security, and also detect password extraction or cracking attempts on your network.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 6: 24th Nov 12pm EST, Nov 25th 12pm EET
10 security vulnerabilities that excite hackers 45 mins
Misconfigurations are one of the fastest-growing security risks that pave the way for threat-actors to intrude into the network. Attackers have now started to realize that leveraging existing security vulnerabilities or misconfigurations in software is a quicker way to to gain access to organizations’ sensitive resources and data. To make things more difficult, such attack techniques are difficult to detect by most traditional security solutions as they exploit the operational flaws.
In this webinar, we’ll help you:
-
Identify the various vulnerabilities and exploitable bugs that can be leveraged by threat actors to intrude into your network.
-
Understand how network misconfigurations and administration mishaps can be the root cause of a security breach, or a propagation factor.
-
Gain complete control over your network by adopting a multi-layer security approach to identify and mitigate vulnerabilities and misconfigurations across popular apps and platforms such as Active Directory (AD),Exchange Servers, cloud infrastructures such as Azure AD, network devices and more.
REGISTER FOR THIS WEBINAR
Register for this webinar
Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.
Webinar 1: 6th Jan 12pm EET
Why Zero Trust should be at the forefront of your IAM strategy 45 mins
Why attend this webinar?
The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.
Steps to adopt a Zero Trust model:
-
Provide frictionless access with MFA and SSO
-
Validate changes with a request and approve process
-
Employ the principle of least privilege (POLP) and just-in-time (JIT) access
-
Disable accounts of former employees automatically
-
Monitor and audit privileged user activity