Missed one of our free webinars? Recordings available upon request.
The Insider's Guide to a Successful Security Awareness Program
Learn how you can achieve a successful security awareness culture. Damian Grace, Founder and General Manager of Phriendly Phishing offers actionable tips and share lessons learned from organisations that have achieved a security awareness culture. Learn about:
- Common security practices your users are ignoring right now.
- How to start with the end in mind and set goals.
- How to communicate for success and win hearts and minds.
- Pitfalls to avoid when managing a security awareness program.
From the Defender's dilemma to the Intruder's dilemma
Learn how you can quickly identify attack behaviours early in the kill chain, reducing the cyber criminals' ability to propagate threats through any part of your network. This webinar also includes a demon illustrating an attack-detect-respond workflow using the AlienVault®USM Anywhere platform. Read more...
- - - - - - - - - - - -
Role of Intelligent Identity in Cyber and Cloud Security
Rajan Barara, Global Product Management Leader - Authentication shared how you can enable your clients to protect their assets and applications using intelligent identity.
Cyber threats are on the rise with credential / password stealing leading the charge and other attacks like malware, bots and impersonation following suit. With increased access to enterprise assets and applications from public internet, mobile devices and varied geographical locations - businesses must protect against impresonation and other unauthorised access to their assets and applications. Read more...
- - - - - - - - - - - -
What can you do to ensure stronger control of your privileged accounts?
The New Zealand Security Advisory is calling for stronger controls of privileged accounts.
The New Zealand Cyber Security Centre (NCSC) released CSA-006-17 "Detecting the Misuse of Administrative Credentials" for a reason. Using existing credentials can be extremely risky and can aid in obfuscating malicious attacks and ongoing presence inside your network for months, if not years!
Recently, Thycotic shared how their PAM solutions address all eight recommendations in the NCSC advisory and how their Privileged Account security solutions can help you enforce security policies. Read more...