300x150-logo-ma

FREE LIVE WEBINARS

3rd, 10th, 16th, 17th & 30th of March 2021

Best-practices-for-implementing-role-based-access-control-(RBAC)-March-2021

 

Why attend this webinar?

1 Are you worried about cybersecurity incidents and insider threats?
2 Aiming for improved audit results and reduced audit costs?
3 Working on improving operational performance?

Steps to adopt a Zero Trust model:

  • How to align roles with your employees.

  • To identify red flags associated with user privileges and how to correct them.

  • How to effectively comply with regulatory requirements.

Register for this webinar

10-security-vulnerabilities-that-excite-hackers-March-2021

 

Why attend this webinar?

Misconfigurations are one of the fastest-growing security risks that pave the way for threat-actors to intrude into the network. Attackers have now started to realize that leveraging existing security vulnerabilities or misconfigurations in software is a quicker way to to gain access to organizations’ sensitive resources and data. To make things more difficult, such attack techniques are difficult to detect by most traditional security solutions as they exploit the operational flaws.

 

In this webinar, we’ll:

  • Identify the various vulnerabilities and exploitable bugs that can be leveraged by threat actors to intrude into your network.

  • Understand how network misconfigurations and administration mishaps can be the root cause of a security breach, or a propagation factor.

  • Gain complete control over your network by adopting a multi-layer security approach to identify and mitigate vulnerabilities and misconfigurations across popular apps and platforms such as Active Directory (AD),Exchange Servers, cloud infrastructures such as Azure AD, network devices and more.

Register for this webinar

Making-cybersecurity-effective-with-threat-intelligence-March-2021

 

Why attend this webinar?

 

Threat intelligence is evidence-based knowledge about existing or emerging hazards to data that can be used to make the right response decisions. Using threat intelligence, you can receive information about malicious domains, URLs, IP addresses and more.

You can then correlate this information with other threat data to make your cybersecurity more effective. Over the last few years, this has become an essential capability of any next-gen security operations center. But how exactly do you get started?

Attend this webinar to learn more.

 

Agenda:

  • The fundamentals of threat intelligence: What is it and why is it important?

  • Bringing threat intelligence data into your SOC.

  • Analyzing threat intelligence reports and using system-generated recommendations.

  • Correlating other threat data with threat intelligence to build context.

  • Threat intelligence of the future.

  • Live demo of how ManageEngine Log360 applies threat intelligence.

Register for this webinar

Secure-user-identities-to-establish-Zero-Trust-March-2021

 

Why attend this webinar?

 

The first step to establishing zero trust in a hybrid infrastructure begins with implementing password security for all users. This should include a fail-proof password policy and multi-factor authentication (2FA) on all accounts that support it.
Learn to achieve this the ADSelfService Plus way.

In this webinar, we’ll learn:

  • NIST password guidelines and best practices.

  • Conditional access based on risk factors.

  • MFA for self-service & logons.

  • One-click access with single sign-on.

Register for this webinar

Everything-you-need-to-know-to-secure-your-Azure-AD-infrastructure-March-2021

 

Why attend this webinar?

 

 

Many organizations that built their foundation with an on-premises Active Directory infrastructure are now looking to integrate with public cloud services like Azure AD. Such hybrid infrastructures improve accessibility, meet growing employee needs and save in-house hardware costs.

However, how can you ensure the secure integration of on-premises AD and Azure cloud infrastructures? How can you safeguard Azure AD objects (like synced on-premise users, Azure groups and enterprise apps) from misuse and configuration errors? How can you protect Azure resources (like storage accounts, Virtual networks (Vnets) and machines) from being compromised?

Whether you’re an intermediate cloud user, or a beginner who is just thinking of adopting the cloud, this webinar will offer crucial tips to secure your hybrid AD environment!

We’ll cover:

  • Gain insight into your Azure AD environment, and learn about user and security object permissions (Like Azure groups, integrated apps, etc).

  • Safely integrate your on-premises AD with Azure AD; secure user idenitities synced in the cloud and resources (like VMs) deployed in Azure.

  • Examine the solutions offered by the tools native to Azure, observe their limitations and cover open gaps with ManageEngine AD360.

Register for this webinar

10-security-vulnerabilities-that-excite-hackers-24-nov-2020

 

Misconfigurations are one of the fastest-growing security risks that pave the way for threat-actors to intrude into the network. Attackers have now started to realize that leveraging existing security vulnerabilities or misconfigurations in software is a quicker way to to gain access to organizations’ sensitive resources and data. To make things more difficult, such attack techniques are difficult to detect by most traditional security solutions as they exploit the operational flaws.

 

In this webinar, we’ll help you:

  • Identify the various vulnerabilities and exploitable bugs that can be leveraged by threat actors to intrude into your network.

  • Understand how network misconfigurations and administration mishaps can be the root cause of a security breach, or a propagation factor.

  • Gain complete control over your network by adopting a multi-layer security approach to identify and mitigate vulnerabilities and misconfigurations across popular apps and platforms such as Active Directory (AD),Exchange Servers, cloud infrastructures such as Azure AD, network devices and more.




Register for this webinar

Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.

ma-jan-6-cit-free-webinar

Why attend this webinar?

The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.

Steps to adopt a Zero Trust model:

  • Provide frictionless access with MFA and SSO

  • Validate changes with a request and approve process

  • Employ the principle of least privilege (POLP) and just-in-time (JIT) access

  • Disable accounts of former employees automatically

  • Monitor and audit privileged user activity