“What’s New”
Webinar & Masterclass Series
Powered By
Various sessions covering topics from all of our vendors’ product range
Part 3: 26h May 11am EEST
Level up your unified IT monitoring strategy | Masterclass | ManageEngine
Watch on demand
Watch on demand
Part 2: 11th May 1pm EEST
A new security stack to face the challenges of the new normal | Webinar | Netskope
Watch on demand
Watch on demand
Part 1: 14th April 11am EEST
Let’s make ITSM wholesome! | Webinar | ManageEngine
Watch on demand
Watch on demand
Webinar 6: 24th Nov 12pm EST, Nov 25th 12pm EET
10 security vulnerabilities that excite hackers 45 mins
Misconfigurations are one of the fastest-growing security risks that pave the way for threat-actors to intrude into the network. Attackers have now started to realize that leveraging existing security vulnerabilities or misconfigurations in software is a quicker way to to gain access to organizations’ sensitive resources and data. To make things more difficult, such attack techniques are difficult to detect by most traditional security solutions as they exploit the operational flaws.
In this webinar, we’ll help you:
Identify the various vulnerabilities and exploitable bugs that can be leveraged by threat actors to intrude into your network.
Understand how network misconfigurations and administration mishaps can be the root cause of a security breach, or a propagation factor.
Gain complete control over your network by adopting a multi-layer security approach to identify and mitigate vulnerabilities and misconfigurations across popular apps and platforms such as Active Directory (AD),Exchange Servers, cloud infrastructures such as Azure AD, network devices and more.
REGISTER FOR THIS WEBINAR
Register for this webinar
Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.
Webinar 1: 6th Jan 12pm EET
Why Zero Trust should be at the forefront of your IAM strategy 45 mins
Why attend this webinar?
The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.
Steps to adopt a Zero Trust model:
Provide frictionless access with MFA and SSO
Validate changes with a request and approve process
Employ the principle of least privilege (POLP) and just-in-time (JIT) access
Disable accounts of former employees automatically
Monitor and audit privileged user activity