Missed one of our free webinars? Recordings available upon request.
Moving beyond traditional protection - how to keep your cloud-based corporate data safe
As corporate data moves off premises and into the cloud, data protection architected from the ground up becomes increasingly important to your data everywhere.
In this webinar, Garth Gilbert from Netskope discusses what you can do to protect your cloud-based corporate data in an environment where your traditional protection does not apply.
Learn how you can implement 360º data protection that will guard your sensitive data with cloud DLP and encryption across SaaS, Iaas, and the web.
Shadow IT is also a big concern for most organisations. Garth discusses the challenges around Shadow IT and what you can do to address the problem. If you don't know what your staff are doing, there is no way for you to protect your organisation and enable your people to work safely.
The Anatomy of a Privileged Account Hack: Everything you need to know to protect your organisation
Matthew Bolton from Thycotic presented a free webinar to help you understand the anatomy of privileged account hacks, and how to defend against them.
Privileged Account Compromise
A compromised privileged account can be the difference between a simple network breach and major disaster. This is because compromised privileged accounts allow attackers to impersonate trusted employees or systems. This kind of access allows intruders to carry out malicious activity without being detected.
- How cybercriminals target their victims.
- What to do to reduce risk and prevent abuse of critical information assets.
- The anatomy of a privileged account hack.
Key business and workflow requirements to help you move your paper-based processes online
Rod Crook from Ascertia shared the key business and workflow requirements you need to consider for your digital transformation. He shared their learnings and experience working with their global partners and customers in implementing high-trust document workflow and digital signature solutions.
Some of these requirements include:
- Data security and residency
- Resilience and scalability
- User security
- Deployment requirements
- Branding requirements
- Standards-based requirements
- High-trust PKI requirements
- Document longevity, verification and evidence
- Role-based permissions and access controls
During this webinar, Rod explored the following in more detail:
- Workflow flexibility
- Signature flexibility
- User flexibility
- - - - - - - - - - - -
The Insider's Guide to a Successful Security Awareness Program
Learn how you can achieve a successful security awareness culture. Damian Grace, Founder and General Manager of Phriendly Phishing offers actionable tips and share lessons learned from organisations that have achieved a security awareness culture. Learn about:
- Common security practices your users are ignoring right now.
- How to start with the end in mind and set goals.
- How to communicate for success and win hearts and minds.
- Pitfalls to avoid when managing a security awareness program.
From the Defender's dilemma to the Intruder's dilemma
Learn how you can quickly identify attack behaviours early in the kill chain, reducing the cyber criminals' ability to propagate threats through any part of your network. This webinar also includes a demon illustrating an attack-detect-respond workflow using the AlienVault®USM Anywhere platform. Read more...
- - - - - - - - - - - -
Role of Intelligent Identity in Cyber and Cloud Security
Rajan Barara, Global Product Management Leader - Authentication shared how you can enable your clients to protect their assets and applications using intelligent identity.
Cyber threats are on the rise with credential / password stealing leading the charge and other attacks like malware, bots and impersonation following suit. With increased access to enterprise assets and applications from public internet, mobile devices and varied geographical locations - businesses must protect against impresonation and other unauthorised access to their assets and applications. Read more...
- - - - - - - - - - - -
What can you do to ensure stronger control of your privileged accounts?
The New Zealand Security Advisory is calling for stronger controls of privileged accounts.
The New Zealand Cyber Security Centre (NCSC) released CSA-006-17 "Detecting the Misuse of Administrative Credentials" for a reason. Using existing credentials can be extremely risky and can aid in obfuscating malicious attacks and ongoing presence inside your network for months, if not years!
Recently, Thycotic shared how their PAM solutions address all eight recommendations in the NCSC advisory and how their Privileged Account security solutions can help you enforce security policies. Read more...