MA-free-webinars-intro-banner-dec-2020

Fundamentals-of-cloud-security-Free-Webinar

 

Why attend this webinar?

Public cloud services are quickly becoming a part of the IT configuration of companies of various sizes. Rapid provisioning of resources and applications, easy scalable storage, all without breaking the bank on infrastructure expense, make cloud an appealing choice. However, for many IT decision makers, security is still a major blockade to implementing cloud initiatives. The doubt forces them to choose a ‘hybrid’ approach for their IT, or completely avoid adopting the cloud. Does it have to be that way?

In this webinar, we’ll :

  • Understand the security aspects of widely used public cloud services such as Azure Active Directory, Amazon Web Services (AWS) , and Google Cloud.

  • Enforce security using the native options and tools, and also understand where they fall short.

  • Close the gaps and implement a complete cloud security strategy with ManageEngine Log360.

Register for this webinar

Rethink-your-password-management-strategy-for-WFH

 

Why attend this webinar?

A recent Gartner survey revealed that 47% of company leaders intend to allow employees to work remotely full-time. As remote working is the new normal, it is a priority to protect hybrid identities. With more than 60% of breaches being credential thefts, according to Verizon’s Data Breach investigation report, it is high time organizations improve their password security posture.

Join our product expert, Sharada Murthy, who will show you how to boost your organization’s security with better authentication.

 

In this webinar, you’ll learn how to:

  • Enable two-factor authentication for local and remote logons.

  • Prevent VPN from being vulnerable, with MFA.

  • Quarantine and eliminate user accounts with weak passwords.

Register for this webinar

Scale-down-insider-threat-risk-through-IAM

 

Why attend this webinar?

 

Managing IT users and resources requires constant vigilance. Your greatest vulnerability lies within your perimeter; all it takes is one weak link in your IT management process for a cybersecurity incident to happen. Join this webinar to learn the top five surefire methods to deter cyberthreats within your organization:

 

In this webinar, you’ll learn how to:

  • Protect against unauthorized changes

  • Avoid privilege creep

  • Clean up inactive accounts

  • Enforce the principle of least privilege

  • Automate access management

Staying-ahead-of-adversarial-tactics

 

Why attend this webinar?

The MITRE ATT&CK framework is an extensive knowledgebase of tactics, techniques and procedures that an adversary might use to compromise an organization. This framework identifies 12 main tactics or technical goals that adversaries have, and each of these tactics are associated with multiple techniques. Techniques describe how tactics are accomplished. The framework also has a list of procedures that describe how specific techniques are implemented at the time of a compromise.

Using this framework, organizations can understand the modus-operandi of attackers, and be better prepared to defend themselves.

Join this webinar to learn to stay ahead of adversarial tactics.

Agenda:

  • The 12 tactics of the MITRE ATT&CK framework.

  • The array of techniques to accomplish tactics.

  • Procedures to implement techniques.

  • A sample journey of an attacker as they traverse the framework.

  • How this framework can benefit organizations.

Register for this webinar

Choosing-the-right-enterprise-IAM-strategy-for-Active-Directory-and-Azure-Active-Directory

 

Why attend this webinar?

Do the right people have the right access to resources? What are the users doing with their access? Are there sufficient methods to control access? Whether your environment is a cloudless ecosystem, in the cloud, or a hybrid of both, it’s crucial to choose the right identity and access governance approach.

Webinar highlights:

  • Learn about various identity and access management (IAM) strategies offered by Active Directory (AD) and Azure AD.

  • Determine possible limitations of IAM approaches in AD and Azure AD.

  • Choose the right IAM strategy for on-premises, cloud, and hybrid deployments with AD360.

Register for this webinar

10-security-vulnerabilities-that-excite-hackers-24-nov-2020

 

Misconfigurations are one of the fastest-growing security risks that pave the way for threat-actors to intrude into the network. Attackers have now started to realize that leveraging existing security vulnerabilities or misconfigurations in software is a quicker way to to gain access to organizations’ sensitive resources and data. To make things more difficult, such attack techniques are difficult to detect by most traditional security solutions as they exploit the operational flaws.

 

In this webinar, we’ll help you:

  • Identify the various vulnerabilities and exploitable bugs that can be leveraged by threat actors to intrude into your network.

  • Understand how network misconfigurations and administration mishaps can be the root cause of a security breach, or a propagation factor.

  • Gain complete control over your network by adopting a multi-layer security approach to identify and mitigate vulnerabilities and misconfigurations across popular apps and platforms such as Active Directory (AD),Exchange Servers, cloud infrastructures such as Azure AD, network devices and more.




Register for this webinar

Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.