Beyondtrust

Live Webcasts, Webinars and Podcasts

Our security experts have compiled a plethora of resources together to help you get more value out
of BeyondTrust products and solutions.

LIVE WEBCASTS

Managing Privileges Within Your Windows Environment
July 10, 2014
10am GMT/BST

We’ll explore how you can secure your environment with PowerBroker for Windows and how organisations can harness the real promise of Least Privilege. We’ll also look at how you discover the risk applications pose in your environment.

Attend this seminar and learn how to:

  • Simplify user management
  • Eliminate local administration access
  • Reduce IT risk
Managing Privileged Accounts on Your Server
July 17, 2014
10am GMT/BST

Providing root access to your critical UNIX and Linux servers allows server admins to manage them, but this in itself presents significant risk. Using PowerBroker for Servers UNIX/Linux Edition gives control back to you without reducing administrator productivity.

Attend this seminar and learn how to:

  • Get control of root access
  • Eliminate direct server logins
  • Get fine-grained control over admin tasks
Securing the Business of Healthcare w/ BeyondTrust's Becky Mitchem & Robert Morley
July 29, 2014
11am PDT/2pm EDT

Healthcare organizations face the unique challenge of guarding the privacy and integrity of protected health information (PHI), which has become increasingly lucrative data to cybercriminals. This data must be secured even more stringently than other types of information, to not only protect relationships with customers and patients, but also to meet the strict compliance regulations that every healthcare provider must adhere to.

The BeyondInsight platform provides results-driven reporting and analytics capabilities that bring risk into focus enterprise-wide. During this webinar you will learn how easy it is within the BeyondInsight platform to:

  • Indicate the type of information you need, such as HIPAA, PCI or other compliance report, and define the business context of your assets
  • Receive targeted, relevant and actionable data in a wide variety of report formats, allowing you to meet your specific HIPAA or other compliance mandates
  • Easily create custom metrics to meet the evolving needs of your business
Managing Vulnerability as IT Risk
July 31, 2014
10am GMT/BST

Us IT folk need to get adept at explaining technology in terms that management understand without getting vague. In this session we’ll look at how we can use Retina CS Enterprise Vulnerability Management to reflect our security position in terms of quantifiable risk and less about gut-feel.

Attend this seminar and learn how to:

  • Get the right information to make the right decisions
  • Target the critical vulnerabilities first
  • Demonstrate progress against security objectives
Demanding MOAR From Your Vulnerability Assessments & Pen Tests by Ed Skoudis
July 31, 2014
10am PDT/1pm EDT

You pay good money for your vulnerability assessments and penetration tests, right? But are you getting real business value from these projects? Do you ever get the sense that your assessors and pen testers are just phoning it in, checking off boxes, and not really properly helping you improve your security stance? In this lively presentation, Ed Skoudis will provide hugely valuable tips for getting the maximum business value out of your vulnerability assessments and pen tests. With specific recommendations for people procuring such projects as well as for testers themselves, this webcast is chock full of insights for effective scoping, best-of-breed methodologies, potent communications, and just plain getting the most vuln assessment and pen test bang for your buck.

Metodología general y herramientas de cómputo forense para el auditor de sistemas: Un avance de Latin CACS 2014 con Osvaldo Lau C., CISA, CRISC, Internal Audit Quality Assessment (QAR) Director - BDO Consulting
August 6, 2014
12pm ART / 11am EDT / 8am PDT
  • Comprender más sobre una metodología general para la realización de revisiones de cómputo forense por el auditor de sistemas
  • Conocer más sobre los puntos clave de una revisión de cómputo forense
  • Obtener conocimiento sobre herramientas y su uso para investigaciones de cómputo forense
  • Conocer consideraciones principales para el manejo de evidencia digital