300x150-logo-ma

FREE LIVE WEBINARS

9th, 15th, 22nd, 23rd & 29th of June 2021

Mastering-Active-Directory-and-Azure-AD-administration-June-banner-2021-cit

 

Why attend this webinar?

Remember the old days when IT environments were on-premise? Machines were on-premise, data was stored in house, users had a single domain-joined account, and even apps were hosted on-premises. Ever since companies have started to embrace the cloud, the IT landscape is becoming difficult to protect and administer. Users have more than a single identity (hybrid identities), workload and company data are now scattered between on-premise and public cloud deployments. This hybrid approach may be a ‘transitional state’ before shifting fully to the cloud, but for most companies, it is just a business model that makes logical sense. Either ways, hybrid IT will continue to be the norm for years to come, and we must adopt a systematic administration strategy.

 

Learn to achieve this the ADSelfService Plus way.

Agenda:

  • Observe in depth the core administration concepts on traditional on-premise deployments like Active Directory (AD) and public cloud infrastructures like Azure AD.

  • Observe the drawbacks of native features and tools that are used for routine IT management tasks and for enforcing security.

  • Overcome the limitations by adopting a systematic approach to streamline critical administration tasks in AD and Azure AD, and also enforce a strategy to prevent security incidents with ManageEngine AD360.

Register for this webinar

IAM-checklist-Get-the-basics-covered-June-banner-2021-cit

Why attend this webinar?

A strong IAM strategy is crucial for the security of your organization’s virtual infrastructure. However, the limitations of legacy IAM solutions can hinder user experience and regulatory compliance. With a few basic rules, you can overcome the challenges and build a resilient and modern IAM system.

In this webinar, you’ll learn:

  • To recognize common security mistakes in native systems

  • The need to transition from manual to automated processes.

  • Best practices for secure access management for resources

Secure-Active-Directory-How-to-reduce-the-risk-from-your-privileged-users-June-banner-2021-cit

Why attend this webinar?

A privileged user with malicious intent can perpetrate an IT sabotage, insider fraud, or intellectual property theft. An external attacker who compromise a privileged account can do the same. A non-malicious privileged user can create lots of security loopholes without any intent to harm. You need to set the right policies for privileged access, and monitor all actions of your privileged users to reduce your cyber risk. Join us for this webinar to find out just how you can do this.

We will cover:

  • The importance of securing your Active Directory.

  • Identifying vulnerabilities and estimating the cyber risk.

  • Three examples and use cases of privilege-based attacks.

  • Deploying the right technology to protect against privileged-based attacks.

Register for this webinar

Secure-user-identities-to-establish-Zero-Trust-June-banner-2021-cit

Why attend this webinar?

The first step to establishing zero trust in a hybrid infrastructure begins with implementing password security for all users. This should include a fail-proof password policy and multi-factor authentication (2FA) on all accounts that support it. Learn to achieve this the ADSelfService Plus way.

Agenda:

  • NIST & NCSC password guidelines and best practices.

  • Conditional access based on risk factors.

  • MFA for self-service & logons.

  • One-click access with single sign-on.

Register for this webinar

Active-Directory-under-attack-From-zero-access-to-domain-admin-June-banner-2021-cit

Why attend this webinar?

Domain administrators (also known as ‘da’s ,for short ) are the crown jewels of Active Directory. Responsible for complete administrative control over the domain, they are the one account attackers are after. The power of a domain admin is still often misused during administration, especially when an account needs sufficient privileges to perform a particular activity. Till date, the domain admin privileges are still directly or indirectly granted to end users, but are seldom revoked.

In this webinar, we will:

  • Observe the different mismanagement and misconfigration practices in daily administration activities that cause the leakage or exposure of domain admin privileges.

  • Perform hands-on, the simulation of different attack tactics employed by attackers to escalate privileges to a domain admin.

  • Employ an end to end security strategy to safeguard all admin accounts (including domain admins) from misuse.

Register for this webinar

10-security-vulnerabilities-that-excite-hackers-24-nov-2020

 

Misconfigurations are one of the fastest-growing security risks that pave the way for threat-actors to intrude into the network. Attackers have now started to realize that leveraging existing security vulnerabilities or misconfigurations in software is a quicker way to to gain access to organizations’ sensitive resources and data. To make things more difficult, such attack techniques are difficult to detect by most traditional security solutions as they exploit the operational flaws.

 

In this webinar, we’ll help you:

  • Identify the various vulnerabilities and exploitable bugs that can be leveraged by threat actors to intrude into your network.

  • Understand how network misconfigurations and administration mishaps can be the root cause of a security breach, or a propagation factor.

  • Gain complete control over your network by adopting a multi-layer security approach to identify and mitigate vulnerabilities and misconfigurations across popular apps and platforms such as Active Directory (AD),Exchange Servers, cloud infrastructures such as Azure AD, network devices and more.




Register for this webinar

Why-Zero-Trust-should-be-at-the-forefront-of-your-IAM-strategy-May-banner-2021

Why attend this webinar?

The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.

Steps to adopt a Zero Trust model:

  • Provide frictionless access with MFA and SSO.

  • Validate changes with a request and approve process.

  • Employ the principle of least privilege (POLP) and just-in-time (JIT) access.

  • Disable accounts of former employees automatically.

  • Monitor and audit privileged user activity.

Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.

ma-jan-6-cit-free-webinar

Why attend this webinar?

The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.

Steps to adopt a Zero Trust model:

  • Provide frictionless access with MFA and SSO

  • Validate changes with a request and approve process

  • Employ the principle of least privilege (POLP) and just-in-time (JIT) access

  • Disable accounts of former employees automatically

  • Monitor and audit privileged user activity