Live Webcasts, Webinars and Podcasts
Our security experts have compiled a plethora of resources together to help you get more value out
of BeyondTrust products and solutions.
Join us for our live webcasts, where you will hear about the latest security issues from industry experts concerning both privileged account management and vulnerability management.
CPE Credit Qualification: Many of our webcasts qualify as CPE credit. Please provide your (ISC)2 ID certificate number when you register for the webcast and your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.
As a professional pen tester, I can tell you that patching is still a major Achilles Heel for many organizations. Sure, the assets in the DMZ get patched - it's pretty rare to come across a random MS08-067 hanging out there in the wind. But internally? It's a mess. Unfortunately, patching is still often treated somewhat ad hoc. There are too many assets, too many exceptions, too many patch failures or crashes or political arguments...you get the idea. However, it's time to take control of your patch management strategy, and looking at your vulnerability management program as a whole is the way to do it.
Join this informative (and fun) webcast, where SANS Instructor and Founder at Voodoo Security, Dave Shackleford, will take a look at some severe patch FAILS. Dave will recount some of his personal experiences in patch management failure, and break down the most critical issues holding many teams back from patching more effectively. In addition, Dave will tie patch management into a larger vulnerability management program, and also talk about what he's seen working in some organizations that have focused in on this problem.
In previous webinars Randy Franklin Smith has showed us how to control what privileged authority in Linux and UNIX. With sudo you can give admins the authority they need without giving away root and all the security risks and compliance problems caused by doing so. But once you carefully delegate limited, privileged authority with sudo you still need an audit trail of what admins are doing. A privileged user audit trail is irreplaceable as a deterrent and detective control over admins and in terms of implementing basic accountability. But in today’s environment of advanced and persistent attackers you also need the ability to actively monitor privileged user activity for quick detection of suspicious events.
Join security expert, Randy Franklin Smith, who will dive into the logging capabilities of sudo. Sudo provides event auditing for tracking command execution by sudoers – both for successful and denied sudo requests as well as errors. Randy will show you how to enable sudo auditing and how to control where it’s logged, if syslog is used and more importantly: what do sudo logs looks like and how do you interpret them?
But sudo also offers session auditing (aka the iolog) which allows you to capture entire sudo sessions including both input and output of commands executed through sudo whether in an interactive shell or via script. Randy will show you how to configure sudo session logging and how to view recorded sessions with sudoreplay.
After Randy’s session, Paul Harper from BeyondTrust will show you how PowerBroker UNIX & Linux builds on sudo’s audit capabilities.
This will be an interesting and technical session, so come with questions!
This webcast qualifies as 1 CPE credit.If you provide your (ISC)2 ID certificate number when you register for the course/s, your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.
For years organizations have worked diligently to lock down their perimeters from external threats only to find out that the most devastating enemy is already inside their doors.
Notable breaches and results from the annual Verizon report only prove what we already know: That a comprehensive security program must include an understanding of insider activity such as anomalous, suspicious, or nontechnical behaviors.
In this webcast, Derek A. Smith, Director of Cybersecurity Initiatives, National Cybersecurity Institute at Excelsior College, will:
- Provide an overview of insider threats
- Discuss insider threat motivations and criminal fundamentals
- Introduce the most common types of insider threats
- Share ways to identify insider threats and protect organizations from them
- Identify insider threat risks, vulnerabilities and weaknesses within an organization, and provide actionable risk mitigation strategies to detect, deter and mitigate the insider threat
Join us for this informative webcast!
**CPE Credit Qualification** This webcast qualifies as 1 CPE credit.If you provide your (ISC)2 ID certificate number when you register for the course/s, your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.
For a hacker to be successful, one thing must occur--access to a system or network. But how does a hacker get access to a system or network in the first place? Passwords, people, and systems, alike, are being exposed and exploited in various Enterprise IT infrastructures on an hourly basis, each and every day. So how do we gear up and protect our passwords, people and networks from being sniffed out and intruded?
Join Chief Information Security Officer, Todd Bell, in an upcoming webcast where he will share how to best avoid common privileged password and security pitfalls that are most likely occurring within the Enterprise, as well as:
- How to provision Privileged Passwords in the enterprise
- Easy fixes to common cyber security Privileged Password mistakes (configs, portals, web sites, etc.)
- Cleaning up Active Directory to prevent overlapping user privileges
- Understanding Privileged Password Management in the Cloud and building access barriers
- How implementing layers of Privilege Management helps prevent hacker intrusions
- Identifying the improper use of password encryption methods that Cloud and Data Center providers are most likely using (and that hackers have yet to figure out!)