Live Webcasts, Webinars and Podcasts

Our security experts have compiled a plethora of resources together to help you get more value out
of BeyondTrust products and solutions.


Receive CPE Credit when you attend our live webcasts

Join us for our live webcasts, where you will hear about the latest security issues from industry experts concerning both privileged account management and vulnerability management.

CPE Credit Qualification: Many of our webcasts qualify as CPE credit. Please provide your (ISC)2 ID certificate number when you register for the webcast and your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.

Monitoring What Your Privileged Users are doing on Linux and UNIX w/ Security Expert, Randy Franklin Smith
April 2, 2015
10am PT/1pm ET

In previous webinars Randy Franklin Smith has showed us how to control what privileged authority in Linux and UNIX. With sudo you can give admins the authority they need without giving away root and all the security risks and compliance problems caused by doing so. But once you carefully delegate limited, privileged authority with sudo you still need an audit trail of what admins are doing. A privileged user audit trail is irreplaceable as a deterrent and detective control over admins and in terms of implementing basic accountability. But in today’s environment of advanced and persistent attackers you also need the ability to actively monitor privileged user activity for quick detection of suspicious events.

Join security expert, Randy Franklin Smith, who will dive into the logging capabilities of sudo. Sudo provides event auditing for tracking command execution by sudoers – both for successful and denied sudo requests as well as errors. Randy will show you how to enable sudo auditing and how to control where it’s logged, if syslog is used and more importantly: what do sudo logs looks like and how do you interpret them?

But sudo also offers session auditing (aka the iolog) which allows you to capture entire sudo sessions including both input and output of commands executed through sudo whether in an interactive shell or via script. Randy will show you how to configure sudo session logging and how to view recorded sessions with sudoreplay.

After Randy’s session, Paul Harper from BeyondTrust will show you how PowerBroker UNIX & Linux builds on sudo’s audit capabilities.

This will be an interesting and technical session, so come with questions!

"The Insider Threat is Real" w/ Director of Cybersecurity Initiatives, Derek A. Smith
April 8, 2015
10am PT/1pm ET

This webcast qualifies as 1 CPE credit.If you provide your (ISC)2 ID certificate number when you register for the course/s, your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.

For years organizations have worked diligently to lock down their perimeters from external threats only to find out that the most devastating enemy is already inside their doors.

Notable breaches and results from the annual Verizon report only prove what we already know: That a comprehensive security program must include an understanding of insider activity such as anomalous, suspicious, or nontechnical behaviors.

In this webcast, Derek A. Smith, Director of Cybersecurity Initiatives, National Cybersecurity Institute at Excelsior College, will:

  • Provide an overview of insider threats 
  • Discuss insider threat motivations and criminal fundamentals 
  • Introduce the most common types of insider threats
  • Share ways to identify insider threats and protect organizations from them 
  • Identify insider threat risks, vulnerabilities and weaknesses within an organization, and provide actionable risk mitigation strategies to detect, deter and mitigate the insider threat 

Join us for this informative webcast!

**CPE Credit Qualification** This webcast qualifies as 1 CPE credit.If you provide your (ISC)2 ID certificate number when you register for the course/s, your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.

Risky Behavior: How to Avoid Common Privileged Password Management Hazards in the Enterprise w/ Chief Information Security Officer, Todd Bell
April 16, 2015
1pm PT / 4pm ET

The annual RSA Conference in San Francisco, CA is right around the corner, and it will undoubtedly deliver the latest security thought leadership, tools and best practices for securing your organization. Join BeyondTrust’s team of security experts – as they discuss what to expect from RSA this year.

Topics covered during this webcast will include:

  • Threat analytics – overhyped and underdelivered?
  • Can’t miss talks and talks to miss
  • Privileged-based attacks as a common vector
  • Vendors to watch
  • Who gives away the best swag

We will also preview BeyondTrust’s presence at the show and give you some tips on maximizing your time at the conference. So whether you are attending RSA 2015 or not, this is a webinar you won’t want to miss. Register today!

Risky Behavior: How to Avoid Common Privileged Password Management Hazards in the Enterprise w/ Chief Information Security Officer, Todd Bell
April 29, 2015
10am PT/1pm ET

For a hacker to be successful, one thing must occur--access to a system or network. But how does a hacker get access to a system or network in the first place? Passwords, people, and systems, alike, are being exposed and exploited in various Enterprise IT infrastructures on an hourly basis, each and every day. So how do we gear up and protect our passwords, people and networks from being sniffed out and intruded?

Join Chief Information Security Officer, Todd Bell, in an upcoming webcast where he will share how to best avoid common privileged password and security pitfalls that are most likely occurring within the Enterprise, as well as:

  • How to provision Privileged Passwords in the enterprise
  • Easy fixes to common cyber security Privileged Password mistakes (configs, portals, web sites, etc.)
  • Cleaning up Active Directory to prevent overlapping user privileges 
  • Understanding Privileged Password Management in the Cloud and building access barriers
  • How implementing layers of Privilege Management helps prevent hacker intrusions
  • Identifying the improper use of password encryption methods that Cloud and Data Center providers are most likely using (and that hackers have yet to figure out!)
Have electronic health records made America more vulnerable?  w/ Dr. Mansur Hasib, CISSP, PMP, CPHIMS
Have Electronic Health Records Made America More Vulnerable? w/ Dr. Mansur Hasib, CISSP, PMP, CPHIMS
May 6, 2015
10am PT/1pm ET

Electronic health records are far more valuable to the modern cyber criminal. For the hacker, they fetch more value over a much longer period of time. For the victim – many who are still children -- the repercussions could last decades! And from what we have seen during the spate of sensational breaches in the last few months, they appear to be far easier to obtain. In early 2014 Community Health Systems yielded over 4.5 million records. Recently, Anthem yielded 80 million! A new “honoree” is being regularly recognized on the “Wall of Shame” at the Department of Health and Human Services website. Many of these breaches involve compromised credentials and abuse of privileges. The attackers get access to a user account. Then they leverage that access to get them into other accounts, until they find one that gets them to the data that they want.

So why is healthcare suddenly so vulnerable? Join one of the nation’s leading experts in healthcare cybersecurity Dr. Mansur Hasib, CISSP, PMP, CPHIMS in a candid discussion of the recent breaches and the possible repercussions. Dr. Hasib has been widely cited in the media on these issues and has done considerable research in this area. His doctoral dissertation was a national study of cybersecurity in healthcare. He also served as Chief Information Officer in healthcare and has intimate knowledge of the healthcare space. Join us and find out:

  • Why is healthcare so vulnerable all of the sudden?
  • Why is healthcare data more valuable than credit card information?
  • What happened at Anthem, Community Health Systems and several other major healthcare companies?
  • How long should we be worried?
  • What can healthcare companies do to better protect themselves?
  • What can members of the public do?