300x150-logo-ma

FREE LIVE WEBINARS

5th, 11th, 20th, 25th & 26th of May 2021

Secure-user-identities-to-establish-Zero-Trust-May-banner-2021

Why attend this webinar?

The first step to establishing zero trust in a hybrid infrastructure begins with implementing password security for all users. This should include a fail-proof password policy and multi-factor authentication (2FA) on all accounts that support it.
Learn to achieve this the ADSelfService Plus way.

Agenda:

  • NIST & NCSC password guidelines and best practices.

  • Conditional access based on risk factors.

  • MFA for self-service & logons.

  • One-click access with single sign-on.

Register for this webinar

Understanding-the-building-blocks-of-a-SIEM-solution-May-banner-2021

Why attend this webinar?

One of the harshest realities of the cybersecurity world is that preventive measures, no matter how advanced, cannot entirely stop every attack from intruding your network. Time after time, security incidents on highly protected infrastructures have confirmed the need for a full time incident monitoring and response program, in other words, a security information and event management (SIEM) solution. SIEM functions as a single window for the security of your entire network— it brings logs together into a centralized location and restructures them into digestible format for examination.
However, it’s really not that simple. There are multiple factors that need to be considered before implementing or purchasing a SIEM solution.

In this webinar, we will answer the following questions:

  • Do you really need a SIEM solution in 2021? Does business size or IT environment influence the effectiveness of a SIEM software?

  • What are the vital factors that should influence your decision of purchasing a SIEM software? For Eg: Scalability, license cost, lT environment compatibility?

  • Can ManageEngine Log360 be the perfect SIEM that solves your cybersecurity requirements?

Register for this webinar

How-to-spot-attackers-in-your-Active-Directory-May-banner-2021

Why attend this webinar?

Cyberattackers of today have numerous sophisticated ways to attack an organization’s Active Directory (AD) infrastructure. Once they get in, they can wreak some serious havoc. And then there is the continuous threat of trusted insiders who can compromise your AD.
In this webinar, we will explore how you can proactively spot attackers in your AD.

We will cover:

  • Why monitoring and protecting your AD is critical.

  • Some AD best practices to improve security.

  • Live demo of an Active Directory attack.

  • Techniques for detecting presence of attackers.

Register for this webinar

Why-Zero-Trust-should-be-at-the-forefront-of-your-IAM-strategy-May-banner-2021

Why attend this webinar?

The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.

Steps to adopt a Zero Trust model:

  • Provide frictionless access with MFA and SSO.

  • Validate changes with a request and approve process.

  • Employ the principle of least privilege (POLP) and just-in-time (JIT) access.

  • Disable accounts of former employees automatically.

  • Monitor and audit privileged user activity.

Ultimate-password-cracking-techniques-in-2021-May-banner-2021

Why attend this webinar?

Passwords have always been one of the quickest ways to gain access to an IT environment. Establishing an initial foothold in the network is the most complex phase of a cyberattack kill chain and an exposed password at even a single endpoint can enable attackers to gain that initial level of access in your network. Almost every security attack involves gaining access to plaintext passwords or hashes at different stages. Password security techniques, such as Multi-Factor Authentication (MFA), have come a long way in improving password security, but threat-actors have always devised new strategies to crack passwords.

In this webinar, we will:

  • Understand the evolution of password-based attacks in 2021, and observe the techniques (from an elementary to advanced level) employed to crack passwords in IT environments such as Microsoft Active Directory (AD) , Azure AD, AWS and more.

  • Perform Root Cause Analysis (RCA) to understand the reason behind weak passwords and IT management practices that expose passwords in a network.

  • Build a comprehensive security strategy that will help you strengthen password security, and also detect password extraction or cracking attempts on your network.

Register for this webinar

10-security-vulnerabilities-that-excite-hackers-24-nov-2020

 

Misconfigurations are one of the fastest-growing security risks that pave the way for threat-actors to intrude into the network. Attackers have now started to realize that leveraging existing security vulnerabilities or misconfigurations in software is a quicker way to to gain access to organizations’ sensitive resources and data. To make things more difficult, such attack techniques are difficult to detect by most traditional security solutions as they exploit the operational flaws.

 

In this webinar, we’ll help you:

  • Identify the various vulnerabilities and exploitable bugs that can be leveraged by threat actors to intrude into your network.

  • Understand how network misconfigurations and administration mishaps can be the root cause of a security breach, or a propagation factor.

  • Gain complete control over your network by adopting a multi-layer security approach to identify and mitigate vulnerabilities and misconfigurations across popular apps and platforms such as Active Directory (AD),Exchange Servers, cloud infrastructures such as Azure AD, network devices and more.




Register for this webinar

Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.

ma-jan-6-cit-free-webinar

Why attend this webinar?

The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.

Steps to adopt a Zero Trust model:

  • Provide frictionless access with MFA and SSO

  • Validate changes with a request and approve process

  • Employ the principle of least privilege (POLP) and just-in-time (JIT) access

  • Disable accounts of former employees automatically

  • Monitor and audit privileged user activity