5th, 11th, 12th, 18th, 19th, and 25th of April 2023

Why attend this webinar?

Group Policy Objects (GPOs) regulate security and access within an AD environment. They are extremely powerful and equally complicated. The sheer number of GPOs, the way they coexist, and their unpredictable order of precedence requires administrators to have high levels of mastery. An uninformed change to a GPO can affect the way users interact with your network permanently. It’s crucial to take utmost care while configuring GPOs. Of course, there is always the possibility of misconfiguring a setting or two in the grand scheme of things. In this webinar, we have put together 7 GPO misconfigurations that you can rectify in under 30 mins to boost the security of your organization.


  • GPOs, and how to keep track of them
  • GPO misconfigurations to fix around users, devices, and data
  • Rectifying misconfigurations using native and powerful solutions
Register for this webinar

Why watch this webinar?

According to Verizon’s 2022 Data Breach Investigations Report, 81% of data breaches involve stolen or weak credentials. Identity-based attacks are on the rise, and it has become essential to put identities at the forefront of your security strategy. Don’t worry, this is not as complicated as it sounds. Join this webinar as we walk you through some simple steps to form an identity-centered security approach with Zero Trust at the core.

In this webinar, you’ll learn about:

  • ADSelfService Plus: A power-packed identity security solution to help kick-start your Zero Trust journey
  • How to secure endpoints by enforcing MFA and strong passwords
  • How to implement an approval workflow to monitor critical AD changes
  • How to reduce the attack surface by enabling SSO and passwordless authentication
  • Leveraging insightful reports to identify bad actors at the earliest stages of an attack and decide how to respond
Register for this webinar

Why attend this webinar?

As organizational perimeters become non-existent, data-centric security has taken center stage. In this webinar, we’ll discuss how you can prioritize your sensitive data and ensure it is secured in all its states. Join us to exchange insights and receive answers to your data security questions and concerns.

This webinar will cover:

  • Addressing blind spots in data security
  • The anatomy of a breach
  • Understanding data at rest, in use, and in motion
  • What constitutes a data security strategy
  • Data security techniques you need to implement
Register for this webinar


Artificial intelligence and machine learning are critical for a mature cybersecurity program. These technologies enable organizations to detect time, count, and pattern anomalies; and compute a risk score for every user and entity in the network. Instead of writing threat detection rules, security analysts can rely on the system learning on its own and alerting them about potential threats. AI and ML in cybersecurity helps decrease false positives, while increasing the occurrence of true positives. Join us in this webinar to learn how AI and ML in cybersecurity have evolved, what they hold for us in the future, and the main elements of an ML-based SIEM solution.


  • Understanding how AI and ML in cybersecurity began
  • Detecting time, count, and pattern anomalies
  • Scoring risks for proactive security
  • Analyzing peer groups and seasonal factors to improve risk scoring
  • Modeling anomalies for added flexibility, precision, and effectiveness
Register for this webinar

Why attend this webinar?

MFA prevents 80 to 90% of cyberattacks, according to Anne Neuberger, American national security official. With cyberattacks becoming more sophisticated and advanced by the day, implementing MFA alone will not get you through. Join this webinar and learn best practices to maximize the benefits of implementing MFA and bolster your endpoint security.

What you’ll learn:

  • Why is MFA critical in today’s threat landscape
  • How MFA can thwart common cyberattacks and bolster your endpoint security
  • 4 MFA best practices to secure endpoints
Register for this webinar

Why attend this webinar?

Unknown sophisticated threats can intrude on a network and evade detection for around 280 days on average. With effective threat hunting, you will be able to reduce the time taken to detect an attacker’s presence, thereby minimizing the damage as well. In this webinar, we’ll look into some threat hunting methods and how your organization can formulate a proactive approach to cybersecurity.


  • Why threat hunting should be an essential component of your defense strategy
  • Threat hunting methods
  • What you need to get started with threat hunting
  • How a SIEM solution can help
Register for this webinar

For more info about the webinars reach out to us by calling +35722256811 for Cyprus or +302109354833 for Greece.